CVE-2007-3275
Published Jun 19, 2007
Last updated 7 years ago
Overview
- Description
- MailWasher Server before 2.2.1, when used with LDAP or Active Directory (AD), does not properly handle blank passwords, which allows remote attackers to access an arbitrary user account and read the spam e-mail messages stored for that account, possibly related to the LoginCheck::doPost function in mwi/servlet/Login.cpp. NOTE: some of these details are obtained from third party information.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.1
- Impact score
- 6.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-255
Evaluator
- Comment
- -
- Impact
- Successful exploitation requires knowledge of a valid username and that MailWasher Server is integrated into an AD domain or LDAP repository.
- Solution
- Successful exploitation requires knowledge of a valid username and that MailWasher Server is integrated into an AD domain or LDAP repository.
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:mailwasher:mailwasher_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D77B45EB-7ABD-45C7-9FA5-A011F351272B", "versionEndIncluding": "2.2.0" } ], "operator": "OR" } ] } ]