5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
29.5%
Simon Scannell reports:
The code vulnerability can be easily exploited by an
attacker by sending a malicious email to a victim that
uses RainLoop as a mail client. When the email is viewed
by the victim, the attacker gains full control over the
session of the victim and can steal any of their emails,
including those that contain highly sensitive information
such as passwords, documents, and password reset links.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | rainloop-php74 | < 1.16.0_2 | UNKNOWN |
FreeBSD | any | noarch | rainloop-php80 | < 1.16.0_2 | UNKNOWN |
FreeBSD | any | noarch | rainloop-php81 | < 1.16.0_2 | UNKNOWN |
FreeBSD | any | noarch | rainloop-community-php74 | < 1.16.0_2 | UNKNOWN |
FreeBSD | any | noarch | rainloop-community-php80 | < 1.16.0_2 | UNKNOWN |
FreeBSD | any | noarch | rainloop-community-php81 | < 1.16.0_2 | UNKNOWN |
5.4 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
REQUIRED
Scope
CHANGED
Confidentiality Impact
LOW
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N
0.001 Low
EPSS
Percentile
29.5%