In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.
History

No history.

cve-icon MITRE Information

Status: PUBLISHED

Assigner: mitre

Published: 2019-07-08T20:58:30

Updated: 2019-07-08T20:58:30

Reserved: 2019-06-20T00:00:00


Link: CVE-2019-12923

JSON object: View

cve-icon NVD Information

Status : Analyzed

Published: 2019-07-08T21:15:09.957

Modified: 2019-07-16T15:33:15.630


Link: CVE-2019-12923

JSON object: View

cve-icon Redhat Information

No data.

CWE