140 lines
4.4 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2007-3275",
"sourceIdentifier": "cve@mitre.org",
"published": "2007-06-19T21:30:00.000",
"lastModified": "2025-04-09T00:30:58.490",
"vulnStatus": "Deferred",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "MailWasher Server before 2.2.1, when used with LDAP or Active Directory (AD), does not properly handle blank passwords, which allows remote attackers to access an arbitrary user account and read the spam e-mail messages stored for that account, possibly related to the LoginCheck::doPost function in mwi/servlet/Login.cpp. NOTE: some of these details are obtained from third party information."
},
{
"lang": "es",
"value": "MailWasher Server versiones anteriores a 2.2.1, cuando es usado con LDAP o Active Directory (AD), no maneja apropiadamente las contrase\u00f1as en blanco, lo que permite a atacantes remotos acceder a una cuenta de usuario arbitraria y leer los mensajes de correo electr\u00f3nico de tipo spam almacenados posiblemente relacionados con la funci\u00f3n LoginCheck::doPost en el archivo mwi/servlet/Login.cpp. NOTA: algunos de estos datos son obtenidos a partir de informaci\u00f3n de terceros."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:N/C:C/I:N/A:N",
"baseScore": 7.1,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "NONE",
"confidentialityImpact": "COMPLETE",
"integrityImpact": "NONE",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "HIGH",
"exploitabilityScore": 8.6,
"impactScore": 6.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-255"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:mailwasher:mailwasher_server:*:*:*:*:*:*:*:*",
"versionEndIncluding": "2.2.0",
"matchCriteriaId": "D77B45EB-7ABD-45C7-9FA5-A011F351272B"
}
]
}
]
}
],
"references": [
{
"url": "http://osvdb.org/37538",
"source": "cve@mitre.org"
},
{
"url": "http://secunia.com/advisories/25695",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=515127",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/24507",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2007/2239",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34925",
"source": "cve@mitre.org"
},
{
"url": "http://osvdb.org/37538",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://secunia.com/advisories/25695",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://sourceforge.net/project/shownotes.php?release_id=515127",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/24507",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2007/2239",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/34925",
"source": "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
],
"evaluatorImpact": "Successful exploitation requires knowledge of a valid username and that MailWasher Server is integrated into an AD domain or LDAP repository."
2023-04-24 12:24:31 +02:00
}