Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r23x-gvpc-gggx

Опубликовано: 17 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.

The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.

EPSS

Процентиль: 59%
0.0039
Низкий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 14 лет назад

The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.

nvd
больше 14 лет назад

The login form in Roundcube Webmail before 0.5.1 does not properly handle a correctly authenticated but unintended login attempt, which makes it easier for remote authenticated users to obtain sensitive information by arranging for a victim to login to the attacker's account and then compose an e-mail message, related to a "login CSRF" issue.

debian
больше 14 лет назад

The login form in Roundcube Webmail before 0.5.1 does not properly han ...

EPSS

Процентиль: 59%
0.0039
Низкий

Дефекты

CWE-20