[原文]Directory traversal vulnerability in admin/main.php in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to overwrite arbitrary files with session information via the sid parameter.
Winmail Server /admin/main.php sid Parameter Traversal Arbitrary File Overwrite
Remote / Network Access
Loss of Integrity
Winmail Mail Server contains a flaw that allows a remote attacker to overwrite files outside of the web path. The issue is due to the main.php script not properly sanitizing user input, specifically traversal style attacks (../../) supplied via the "sid" parameter.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.