The "XML Interface to Messaging, Scheduling, and Signaling" (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address. The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/145724/communigatepro62-spoof | Exploit Third Party Advisory VDB Entry |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2018-01-08T05:00:00
Updated: 2018-01-08T04:57:01
Reserved: 2018-01-01T00:00:00
Link: CVE-2018-3815
JSON object: View
NVD Information
Status : Analyzed
Published: 2018-01-08T05:29:00.290
Modified: 2019-10-03T00:03:26.223
Link: CVE-2018-3815
JSON object: View
Redhat Information
No data.
CWE