In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.
2019-07-08T21:15:09.957
2024-11-21T04:23:49.797
Modified
CVSSv3.0: 6.5 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | mailenable | mailenable | < 6.90 | Yes |
| Application | mailenable | mailenable | < 7.62 | Yes |
| Application | mailenable | mailenable | < 8.64 | Yes |
| Application | mailenable | mailenable | < 9.83 | Yes |
| Application | mailenable | mailenable | < 10.24 | Yes |