CVE-2011-1491
Published Apr 8, 2011
Last updated 7 years ago
Overview
- Description
- The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.
- Source
- secalert@redhat.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 3.5
- Impact score
- 2.9
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:P/I:N/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:roundcube:webmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2E961628-4624-4095-8CE6-698F66BF462B", "versionEndIncluding": "0.5" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4C785B00-7F4D-4EBD-A9FA-726D4D35E5D1" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8F433741-5F73-43B5-A522-C484C64C66A7" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "09DF755B-041E-4A61-BEF6-A613F6F0CE13" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:beta2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34D20437-7DE7-4DB8-8C11-37B09A87E3A4" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "55FB4AA3-3528-46B7-BBB9-9185DAA5425C" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "066AA2BC-95A8-43E8-A1FE-9F15860691E1" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "82FB886B-35A4-4A8C-AE18-62C845886018" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "83FF6973-9BAC-4DF2-BACE-42F0D9340A27" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.2:alpha:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EB6449FD-C6EE-497C-BE34-88900883AD09" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.2:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0CEF8BF6-E09F-4376-B089-9B722A84F591" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "946B0B6A-46D3-46B9-BD1E-B03D3339EEB3" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D4D6EA96-EE58-47C3-B545-7238B3F64941" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.3:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3584BB62-818D-4A5B-BC7D-EAB0B85614EA" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.3:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "332FF744-3682-4818-9602-8F868BF0781E" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B502047-4DDD-4586-978C-6CEE1C41F923" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "43581564-48CF-410C-9CE1-CBAE71153DA5" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.4:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A5CC548-05E4-4059-8252-FA78ECBB95A0" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3FA495A-D7FE-4461-AF57-EB649A1C49B6" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2D773E61-113A-4EE8-804E-0584B73AB58D" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.5:beta:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FC0D4825-F78E-40F5-A9CB-45B73DE8FBD4" }, { "criteria": "cpe:2.3:a:roundcube:webmail:0.5:rc:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9C8376B9-4DF2-4E23-9C43-EEDE3D800519" } ], "operator": "OR" } ] } ]