MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users' credentials (including the highest privileged users).
The product does not encrypt sensitive or critical information before storage or transmission.
Link | Tags |
---|---|
http://www.mailenable.com/Premium-ReleaseNotes.txt | release notes vendor advisory |
https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/ | third party advisory release notes |