Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.
References
Configurations
History
21 Nov 2024, 02:03
Type | Values Removed | Values Added |
---|---|---|
References | () http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html - Exploit | |
References | () http://seclists.org/fulldisclosure/2015/May/95 - Exploit | |
References | () http://www.exploit-db.com/exploits/37114 - Exploit | |
References | () http://www.securityfocus.com/archive/1/535592/100/0/threaded - | |
References | () http://www.sendio.com/software-release-history/ - Vendor Advisory |
Information
Published : 2015-06-02 14:59
Updated : 2024-11-21 02:03
NVD link : CVE-2014-0999
Mitre link : CVE-2014-0999
CVE.ORG link : CVE-2014-0999
JSON object : View
Products Affected
sendio
- sendio
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor