Web Based Administration in MicroWorld Technologies MailScan 5.6.a espatch 1 allows remote attackers to bypass authentication and obtain administrative access via a direct request with (1) an IsAdmin=true cookie value or (2) no cookie.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Link | Tags |
---|---|
http://securityreason.com/securityalert/4172 | third party advisory |
http://www.securityfocus.com/bid/30700 | vdb entry exploit |
https://exchange.xforce.ibmcloud.com/vulnerabilities/44515 | vdb entry |
http://marc.info/?l=bugtraq&m=121881329424635&w=2 | mailing list exploit |
http://www.oliverkarow.de/research/mailscan.txt | exploit |