Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
NVD Vulnerability Details :
CVE-2019-12923
Analyzed
More InfoOfficial Page
Source-cve@mitre.org
View Known Exploited Vulnerability (KEV) details
Published At-08 Jul, 2019 | 21:15
Updated At-16 Jul, 2019 | 15:33

In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.06.5MEDIUM
CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:H/A:N
Primary2.04.3MEDIUM
AV:N/AC:M/Au:N/C:N/I:P/A:N
CPE Matches

mailenable
mailenable
>>mailenable>>Versions from 6.0(inclusive) to 6.90(exclusive)
cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
mailenable
mailenable
>>mailenable>>Versions from 7.0(inclusive) to 7.62(exclusive)
cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
mailenable
mailenable
>>mailenable>>Versions from 8.00(inclusive) to 8.64(exclusive)
cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
mailenable
mailenable
>>mailenable>>Versions from 9.0(inclusive) to 9.83(exclusive)
cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
mailenable
mailenable
>>mailenable>>Versions from 10.00(inclusive) to 10.24(exclusive)
cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*
Weaknesses
CWE IDTypeSource
CWE-352Primarynvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
http://www.mailenable.com/Premium-ReleaseNotes.txtcve@mitre.org
Release Notes
Vendor Advisory
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/cve@mitre.org
Release Notes
Third Party Advisory
Change History
0Changes found

Details not found