CVE-2019-12923
08.07.2019, 21:15
In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.
Vendor | Product | Version |
---|---|---|
mailenable | mailenable | 6.0 ≤ 𝑥 < 6.90 |
mailenable | mailenable | 7.0 ≤ 𝑥 < 7.62 |
mailenable | mailenable | 8.00 ≤ 𝑥 < 8.64 |
mailenable | mailenable | 9.0 ≤ 𝑥 < 9.83 |
mailenable | mailenable | 10.00 ≤ 𝑥 < 10.24 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
References