CVE-2004-1103

Current Description

MailPost 5.1.1sv, and possibly earlier versions, when debug mode is enabled, allows remote attackers to gain sensitive information via the debug parameter, which reveals information such as the path to the web root and the web server version.

Basic Data

PublishedJanuary 10, 2005
Last ModifiedJuly 11, 2017
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:P/I:N/A:N
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactPARTIAL
CVSS 2 - Availability ImpactNONE
CVSS 2 - Base Score5.0
SeverityMEDIUM
Exploitability Score10.0
Impact Score2.9
Obtain All Privilegefalse
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationTipsMailpost5.1.1_sv*******

Vulnerable Software List

VendorProductVersions
Tips Mailpost 5.1.1_sv

References

NameSourceURLTags
VU#858726http://www.kb.cert.org/vuls/id/858726CERT-VNThird Party Advisory US Government Resource
http://www.procheckup.com/security_info/vuln_pr0409.htmlhttp://www.procheckup.com/security_info/vuln_pr0409.htmlMISC
11595http://www.securityfocus.com/bid/11595BIDVendor Advisory
mailpost-information-disclosure(17952)https://exchange.xforce.ibmcloud.com/vulnerabilities/17952XF