- Description
- MailWasher Server before 2.2.1, when used with LDAP or Active Directory (AD), does not properly handle blank passwords, which allows remote attackers to access an arbitrary user account and read the spam e-mail messages stored for that account, possibly related to the LoginCheck::doPost function in mwi/servlet/Login.cpp. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:N/A:N
- nvd@nist.gov
- CWE-255
- Hype score
- Not currently trending
- Comment
- -
- Impact
- Successful exploitation requires knowledge of a valid username and that MailWasher Server is integrated into an AD domain or LDAP repository.
- Solution
- Successful exploitation requires knowledge of a valid username and that MailWasher Server is integrated into an AD domain or LDAP repository.
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mailwasher:mailwasher_server:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "D77B45EB-7ABD-45C7-9FA5-A011F351272B",
"versionEndIncluding": "2.2.0"
}
],
"operator": "OR"
}
]
}
]