Rockliffe MailSite Express before 6.1.22, with the option to save login information enabled, saves user passwords in plaintext in cookies, which allows local users to obtain passwords by reading the cookie file, or remote attackers to obtain the cookies via cross-site scripting (XSS) vulnerabilities.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://archives.neohapsis.com/archives/fulldisclosure/2005-10/0578.html - Exploit, Patch | |
References | () http://marc.info/?l=bugtraq&m=113053680631151&w=2 - | |
References | () http://securitytracker.com/id?1015117 - | |
References | () http://www.osvdb.org/22682 - | |
References | () http://www.security-assessment.com/Advisories/Rockliffe_Express_Webmail_Vulnerabilities.pdf - Exploit, Patch, Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/22906 - |
Information
Published : 2005-11-02 11:02
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3429
Mitre link : CVE-2005-3429
CVE.ORG link : CVE-2005-3429
JSON object : View
Products Affected
rockliffe
- mailsite_express
CWE