CVE-2019-12924
Severity CVSS v4.0:
Pending analysis
Type:
CWE-311
Missing Encryption of Sensitive Data
Publication date:
08/07/2019
Last modified:
24/08/2020
Description
MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users' credentials (including the highest privileged users).
Impact
Base Score 3.x
9.80
Severity 3.x
CRITICAL
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 6.0 (including) | 6.90 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 7.0 (including) | 7.62 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 8.00 (including) | 8.64 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 9.0 (including) | 9.83 (excluding) |
| cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:* | 10.00 (including) | 10.24 (excluding) |
To consult the complete list of CPE names with products and versions, see this page



