CVE-2011-0063
Majordomo <20110203 - Path Traversal
Title source: llmDescription
The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Michael Brooks · textremotemultiple
https://www.exploit-db.com/exploits/16103
metasploit
WORKING POC
by Nikolas Sotiriu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb
References (6)
Scores
EPSS
0.8998
EPSS Percentile
99.6%
Details
CWE
CWE-22
Status
published
Products (34)
mj2/majordomo_2
20110101
mj2/majordomo_2
20110102
mj2/majordomo_2
20110103
mj2/majordomo_2
20110104
mj2/majordomo_2
20110105
mj2/majordomo_2
20110106
mj2/majordomo_2
20110107
mj2/majordomo_2
20110108
mj2/majordomo_2
20110109
mj2/majordomo_2
20110110
... and 24 more
Published
Mar 15, 2011
Tracked Since
Feb 18, 2026