CVE-2010-3486

SmarterMail 7.1.3876 - Path Traversal

Title source: llm
STIX 2.1

Description

Directory traversal vulnerability in FileStorageUpload.ashx in SmarterMail 7.1.3876 allows remote attackers to read arbitrary files via a (1) ../ (dot dot slash), (2) %5C (encoded backslash), or (3) %255c (double-encoded backslash) in the name parameter.

Exploits (3)

exploitdb WRITEUP VERIFIED
by Hoyt LLC Research · textwebappsasp
https://www.exploit-db.com/exploits/16955
exploitdb WRITEUP VERIFIED
by sqlhacker · textwebappsasp
https://www.exploit-db.com/exploits/15189
exploitdb WRITEUP VERIFIED
by sqlhacker · textremotewindows
https://www.exploit-db.com/exploits/15048

References (5)

Core 5
Core References
Third Party Advisory, VDB Entry vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/43324
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/61910
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/15048

Scores

EPSS 0.0802
EPSS Percentile 92.1%

Details

CWE
CWE-22
Status published
Products (1)
smartertools/smartermail 7.1.3876
Published Sep 22, 2010
Tracked Since Feb 18, 2026