An issue was discovered in CipherMail Community Gateway and Professional/Enterprise Gateway 1.0.1 through 4.7.1-0 and CipherMail Webmail Messenger 1.1.1 through 3.1.1-0. Attackers with administrative access to the web interface have multiple options to escalate their privileges to the Unix root account.
The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
Link | Tags |
---|---|
https://www.ciphermail.com/news.html | release notes vendor advisory |
https://www.ciphermail.com/gateway.html | product vendor advisory |
https://www.ciphermail.com/secure-webmail.html | product vendor advisory |
http://packetstormsecurity.com/files/158001/CipherMail-Community-Virtual-Appliance-4.6.2-Code-Execution.html | third party advisory vdb entry exploit |
https://www.ciphermail.com/blog/ciphermail-cve-2020-12713_2020-12714.html | patch vendor advisory |
https://www.coresecurity.com/core-labs/advisories/ciphermail-multiple-vulnerabilities | third party advisory exploit |