7 results (0.007 seconds)

CVSS: 5.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security http://uncensored.citadel.org/msg/4576039 • CWE-77: Improper Neutralization of Special Elements used in a Command ('Command Injection') •

CVSS: 3.7EPSS: 0%CPEs: 1EXPL: 1

An issue was discovered in Citadel through webcit-932. A meddler-in-the-middle attacker can fixate their own session during the cleartext phase before a STARTTLS command (a violation of "The STARTTLS command is only valid in non-authenticated state." in RFC2595). This potentially allows an attacker to cause a victim's e-mail messages to be stored into an attacker's IMAP mailbox, but depends on details of the victim's client behavior. • http://uncensored.citadel.org/dotgoto?room=Citadel%20Security https://nostarttls.secvuln.info https://uncensored.citadel.org/msg/2099264259 •

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 1

A Weak Session Management vulnerability in Citadel WebCit through 926 allows unauthenticated remote attackers to hijack recently logged-in users' sessions. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Administración de Sesión Débil en Citadel WebCit versiones hasta 926, permite a atacantes remotos no autenticados secuestrar las sesiones de los usuarios que iniciaron sesión recientemente. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 https://www.citadel.org • CWE-613: Insufficient Session Expiration •

CVSS: 6.5EPSS: 0%CPEs: 1EXPL: 1

An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Una vulnerabilidad de Referencia Directa a Objetos No segura en Citadel WebCit versiones hasta 926, permite a atacantes remotos autenticados leer los correos electrónicos de otra persona por medio de la plantilla msg_confirm_move. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 https://www.citadel.org • CWE-639: Authorization Bypass Through User-Controlled Key •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 1

Multiple cross-site scripting (XSS) vulnerabilities in Citadel WebCit through 926 allow remote attackers to inject arbitrary web script or HTML via multiple pages and parameters. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread. Múltiples vulnerabilidades de tipo cross-site scripting (XSS) en Citadel WebCit versiones hasta 926, permiten a atacantes remotos inyectar script web o HTML arbitrario por medio de múltiples páginas y parámetros. NOTA: esto se reportó al proveedor en un hilo o subproceso "Multiple Security Vulnerabilities in WebCit 926" archivado públicamente • http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834 https://www.citadel.org • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •