|
Vulnerability Assessment & Network Security Forums |
|||||||||
If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important. If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery. Home >> Browse Vulnerability Assessment Database >> Remote file access >> IlohaMail Readable Configuration Files Vulnerability Assessment Details
|
IlohaMail Readable Configuration Files |
||
Checks for Readable Configuration Files in IlohaMail Detailed Explanation for this Vulnerability Assessment The target is running at least one instance of IlohaMail that permits anyone to retrieve its configuration files over the web. These files may contain sensitive information. For example, conf/conf.inc may hold a username / password used for SMTP authentication. Solution : Upgrade to IlohaMail version 0.8.14-rc2 or later or reinstall following the 'Proper Installation' instructions in the INSTALL document. Network Security Threat Level: Medium Networks Security ID: 12252 Vulnerability Assessment Copyright: This script is Copyright (C) 2005 George A. Theall |
||
Cables, Connectors |
|
||
No Discussions have been posted on this vulnerability. |