Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.
The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.
Link | Tags |
---|---|
http://seclists.org/fulldisclosure/2015/May/95 | mailing list exploit |
http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html | exploit |
http://www.securityfocus.com/archive/1/535592/100/0/threaded | mailing list |
http://www.sendio.com/software-release-history/ | vendor advisory |
http://www.exploit-db.com/exploits/37114 | exploit |