MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
References
Link | Resource |
---|---|
http://www.mailenable.com/Premium-ReleaseNotes.txt | Release Notes Vendor Advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/ | Release Notes Third Party Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: mitre
Published: 2019-07-08T21:03:06
Updated: 2019-07-08T21:03:06
Reserved: 2019-06-20T00:00:00
Link: CVE-2019-12926
JSON object: View
NVD Information
Status : Analyzed
Published: 2019-07-08T22:15:11.737
Modified: 2020-08-24T17:37:01.140
Link: CVE-2019-12926
JSON object: View
Redhat Information
No data.
CWE