16 results (0.003 seconds)

CVSS: 5.4EPSS: 0%CPEs: 1EXPL: 0

A cross-site scripting vulnerability exists in Citadel versions prior to 994. When a malicious user sends an instant message with some JavaScript code, the script may be executed on the web browser of the victim user. Existe una vulnerabilidad de Cross-Site Scripting (XSS) en las versiones Citadel anteriores a la 994. Cuando un usuario malintencionado envía un mensaje instantáneo con algún código JavaScript, la secuencia de comandos puede ejecutarse en el navegador web del usuario víctima. • https://code.citadel.org/citadel/citadel https://code.citadel.org/citadel/citadel/-/commit/f0dac5ff074ad686fa71ea663c8ead107bd3041e https://jvn.jp/en/jp/JVN08237727 https://www.citadel.org/download.html • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security http://uncensored.citadel.org/msg/4576039 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Citadel through webcit-932. A meddler-in-the-middle attacker can fixate their own session during the cleartext phase before a STARTTLS command (a violation of "The STARTTLS command is only valid in non-authenticated state." in RFC2595). This potentially allows an attacker to cause a victim's e-mail messages to be stored into an attacker's IMAP mailbox, but depends on details of the victim's client behavior. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security https://nostarttls.secvuln.info https://uncensored.citadel.org/msg/2099264259 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users' sessions. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Administración de Sesión Débil en Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados secuestrar las sesiones de los usuarios que iniciaron sesión recientemente. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 https://www.citadel.org • CWE-613: Insufficient Session Expiration •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Referencia Directa a Objetos No segura en Citadel WebCit versiones hasta 926, permite a atacantes remotos autenticados leer los correos electrónicos de otra persona por medio de la plantilla msg_confirm_move. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 https://www.citadel.org • CWE-639: Authorization Bypass Through User-Controlled Key •