Description
Uebimiau Webmail allows remote attackers to obtain sensitive information via a request to demo/pop3/error.php with an invalid value of the (1) smarty or (2) selected_theme parameter, which reveals the path in various error messages.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Michal Majchrowicz · textwebappsphp
https://www.exploit-db.com/exploits/30098
References (4)
Core 4
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://osvdb.org/38337
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/24210
Exploit mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2007-May/063629.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/34554
Scores
EPSS
0.0365
EPSS Percentile
87.9%
Details
Status
published
Products (3)
uebimiau/uebimiau
2.7.2
uebimiau/uebimiau
2.7.9
uebimiau/uebimiau
2.7.10
Published
Jun 11, 2007
Tracked Since
Feb 18, 2026