Multiple cross-site request forgery (CSRF) vulnerabilities in Synametrics Technologies Xeams 4.5 Build 5755 and earlier allow remote attackers to hijack the authentication of administrators for requests that create an (1) SMTP domain or a (2) user via a request to /FrontController; or conduct cross-site scripting (XSS) attacks via the (3) domainname parameter to /FrontController, when creating a new SMTP domain configuration; the (4) txtRecipient parameter to /FrontController, when creating a new forwarder; the (5) popFetchServer, (6) popFetchUser, or (7) popFetchRecipient parameter to /FrontController, when creating a new POP3 Fetcher account; or the (8) Smtp HELO domain in the Advanced Server Configuration.
References
Configurations
History
21 Nov 2024, 02:28
Type | Values Removed | Values Added |
---|---|---|
References | () http://osvdb.org/show/osvdb/121847 - | |
References | () http://packetstormsecurity.com/files/131844/Xeams-4.5-Build-5755-CSRF-Cross-Site-Scripting.html - Exploit | |
References | () http://www.securityfocus.com/bid/74578 - | |
References | () https://www.exploit-db.com/exploits/36949/ - Exploit |
Information
Published : 2015-05-20 19:59
Updated : 2024-11-21 02:28
NVD link : CVE-2015-3141
Mitre link : CVE-2015-3141
CVE.ORG link : CVE-2015-3141
JSON object : View
Products Affected
synametrics
- xeams
CWE
CWE-352
Cross-Site Request Forgery (CSRF)