MailEnable Enterprise Premium 10.23 was vulnerable to multiple directory traversal issues, with which authenticated users could add, remove, or potentially read files in arbitrary folders accessible by the IIS user. This could lead to reading other users' credentials including those of SYSADMIN accounts, reading other users' emails, or adding emails or files to other users' accounts.
References
Link | Resource |
---|---|
http://www.mailenable.com/Premium-ReleaseNotes.txt | Release Notes Vendor Advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/ | Release Notes Third Party Advisory |
http://www.mailenable.com/Premium-ReleaseNotes.txt | Release Notes Vendor Advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/ | Release Notes Third Party Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.mailenable.com/Premium-ReleaseNotes.txt - Release Notes, Vendor Advisory | |
References | () https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/ - Release Notes, Third Party Advisory |
Information
Published : 2019-07-08 22:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12925
Mitre link : CVE-2019-12925
CVE.ORG link : CVE-2019-12925
JSON object : View
Products Affected
mailenable
- mailenable
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')