MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users’ credentials (including the highest privileged users).
CPE | Name | Operator | Version |
---|---|---|---|
mailenable | ge | 6.0 | |
mailenable | lt | 6.90 | |
mailenable | ge | 7.0 | |
mailenable | lt | 7.62 | |
mailenable | ge | 8.00 | |
mailenable | lt | 8.64 | |
mailenable | ge | 9.0 | |
mailenable | lt | 9.83 | |
mailenable | ge | 10.00 | |
mailenable | lt | 10.24 |