Description
Directory traversal vulnerability in FileStorageUpload.ashx in SmarterMail 7.1.3876 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash), (2) %5C (encoded backslash), or (3) %255c (double-encoded backslash) in the name parameter.
Exploits (3)
exploitdb
WRITEUP
VERIFIED
by Hoyt LLC Research · textwebappsasp
https://www.exploit-db.com/exploits/16955
exploitdb
WRITEUP
VERIFIED
by sqlhacker · textremotewindows
https://www.exploit-db.com/exploits/15048
References (5)
Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/43324
Exploit x_refsource_misc
http://cloudscan.blogspot.com/2010/09/smarter-stats-533819-file-fuzzing.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/61910
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/15048
Exploit x_refsource_misc
http://packetstormsecurity.org/1009-exploits/smartermail-traversal.txt
Scores
EPSS
0.0802
EPSS Percentile
92.1%
Details
CWE
CWE-22
Status
published
Products (1)
smartertools/smartermail
7.1.3876
Published
Sep 22, 2010
Tracked Since
Feb 18, 2026