CVE-2011-0063

Majordomo <20110203 - Path Traversal

Title source: llm

Description

The _list_file_get function in lib/Majordomo.pm in Majordomo 2 20110203 and earlier allows remote attackers to conduct directory traversal attacks and read arbitrary files via a ./.../ sequence in the "extra" parameter to the help command, which causes the regular expression to produce .. (dot dot) sequences. NOTE: this vulnerability is due to an incomplete fix for CVE-2011-0049.

Exploits (2)

exploitdb WORKING POC VERIFIED
by Michael Brooks · textremotemultiple
https://www.exploit-db.com/exploits/16103
metasploit WORKING POC
by Nikolas Sotiriu · rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/majordomo2_directory_traversal.rb

Scores

EPSS 0.8998
EPSS Percentile 99.6%

Details

CWE
CWE-22
Status published
Products (34)
mj2/majordomo_2 20110101
mj2/majordomo_2 20110102
mj2/majordomo_2 20110103
mj2/majordomo_2 20110104
mj2/majordomo_2 20110105
mj2/majordomo_2 20110106
mj2/majordomo_2 20110107
mj2/majordomo_2 20110108
mj2/majordomo_2 20110109
mj2/majordomo_2 20110110
... and 24 more
Published Mar 15, 2011
Tracked Since Feb 18, 2026