Redbrick Shift through 3.4.3 allows an attacker to extract emails of services (such as Gmail, Outlook, etc.) used in the application.
The product searches for critical resources using an externally-supplied search path that can point to resources that are not under the product's direct control.
Link | Tags |
---|---|
https://support.tryshift.com/kb/article/206-shift-34-released-on-january-23-2019/ | release notes vendor advisory |