An information exposure vulnerability has been found, the exploitation of which could allow a remote user to retrieve sensitive information stored on the server such as credential files, configuration files, application files, etc., simply by appending any of the following parameters to the end of the URL: %00 %0a, %20, %2a, %a0, %aa, %c0 and %ca.
References
Link | Resource |
---|---|
https://www.incibe.es/en/incibe-cert/notices/aviso/multiple-vulnerabilities-bvrp-software-slmail | Third Party Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
No history.
Information
Published : 2023-11-23 13:15
Updated : 2023-11-29 21:23
NVD link : CVE-2023-4595
Mitre link : CVE-2023-4595
CVE.ORG link : CVE-2023-4595
JSON object : View
Products Affected
microsoft
- windows
seattlelab
- slmail
CWE
CWE-538
Insertion of Sensitive Information into Externally-Accessible File or Directory