MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users' credentials (including the highest privileged users).
2019-07-08T21:15:10.037
2024-11-21T04:23:49.943
Modified
CVSSv3.0: 9.8 (CRITICAL)
AV:N/AC:L/Au:N/C:P/I:N/A:N
10.0
2.9
| Type | Vendor | Product | Version/Range | Vulnerable? |
|---|---|---|---|---|
| Application | mailenable | mailenable | < 6.90 | Yes |
| Application | mailenable | mailenable | < 7.62 | Yes |
| Application | mailenable | mailenable | < 8.64 | Yes |
| Application | mailenable | mailenable | < 9.83 | Yes |
| Application | mailenable | mailenable | < 10.24 | Yes |