Directory traversal vulnerability in the true_path function in private.py for Mailman 2.1.5 and earlier allows remote attackers to read arbitrary files via ".../....///" sequences, which are not properly cleansed by regular expressions that are intended to remove "../" and "./" sequences.
Get an AI-powered plain-language explanation of this vulnerability and remediation steps.
Login to generate AI explanation24 reference(s) from NVD