Vulnerabilities > CVE-2007-0652 - Unspecified vulnerability in Mailenable Professional
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN mailenable
nessus
Summary
Cross-site request forgery (CSRF) vulnerability in MailEnable Professional before 2.37 allows remote attackers to modify arbitrary configurations and perform unauthorized actions as arbitrary users via a link or IMG tag.
Vulnerable Configurations
Nessus
NASL family | CGI abuses |
NASL id | MAILENABLE_WEBMAIL_XSS.NASL |
description | The Web Mail Client bundled with the version of MailEnable installed on the remote host reportedly fails to properly sanitize email messages and various script parameters of malicious script code, which can lead to cross-site scripting, cross-site request forgery, and script insertion attacks against the affected software. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 24345 |
published | 2007-02-15 |
reporter | This script is Copyright (C) 2007-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/24345 |
title | MailEnable Web Mail Client Multiple Vulnerabilities (XSS, CSRF) |
code |
|
References
- http://osvdb.org/33191
- http://osvdb.org/33191
- http://secunia.com/advisories/23998
- http://secunia.com/advisories/23998
- http://secunia.com/secunia_research/2007-38/advisory/
- http://secunia.com/secunia_research/2007-38/advisory/
- http://securityreason.com/securityalert/2258
- http://securityreason.com/securityalert/2258
- http://www.securityfocus.com/archive/1/460063/100/0/threaded
- http://www.securityfocus.com/archive/1/460063/100/0/threaded
- http://www.securityfocus.com/bid/22554
- http://www.securityfocus.com/bid/22554
- http://www.vupen.com/english/advisories/2007/0595
- http://www.vupen.com/english/advisories/2007/0595