CVE-2019-12924 (GCVE-0-2019-12924)

Vulnerability from cvelistv5 – Published: 2019-07-08 21:00 – Updated: 2024-08-04 23:32
VLAI?
Summary
MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users' credentials (including the highest privileged users).
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Date Public ?
2019-07-02 00:00
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T23:32:55.586Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.mailenable.com/Premium-ReleaseNotes.txt"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2019-07-02T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users\u0027 credentials (including the highest privileged users)."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-07-08T21:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.mailenable.com/Premium-ReleaseNotes.txt"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2019-12924",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users\u0027 credentials (including the highest privileged users)."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.mailenable.com/Premium-ReleaseNotes.txt",
              "refsource": "CONFIRM",
              "url": "http://www.mailenable.com/Premium-ReleaseNotes.txt"
            },
            {
              "name": "https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/",
              "refsource": "MISC",
              "url": "https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2019-12924",
    "datePublished": "2019-07-08T21:00:00.000Z",
    "dateReserved": "2019-06-20T00:00:00.000Z",
    "dateUpdated": "2024-08-04T23:32:55.586Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "epss": {
      "cve": "CVE-2019-12924",
      "date": "2026-04-25",
      "epss": "0.00115",
      "percentile": "0.29901"
    },
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\", \"versionStartIncluding\": \"6.0\", \"versionEndExcluding\": \"6.90\", \"matchCriteriaId\": \"F7B4998A-BD40-4D0D-AC78-0457F40067C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\", \"versionStartIncluding\": \"7.0\", \"versionEndExcluding\": \"7.62\", \"matchCriteriaId\": \"9B9FFD5C-6982-4B54-BED3-DBAF30490439\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\", \"versionStartIncluding\": \"8.00\", \"versionEndExcluding\": \"8.64\", \"matchCriteriaId\": \"1FAD50A0-D3E4-40B7-80DB-AD741B1BE1E6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\", \"versionStartIncluding\": \"9.0\", \"versionEndExcluding\": \"9.83\", \"matchCriteriaId\": \"5DCC3F1A-6A49-4A2B-B973-1A44EFEF675B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\", \"versionStartIncluding\": \"10.00\", \"versionEndExcluding\": \"10.24\", \"matchCriteriaId\": \"55F2A0A6-2BA0-4176-B9A2-9E2A86635BC2\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users\u0027 credentials (including the highest privileged users).\"}, {\"lang\": \"es\", \"value\": \"MailEnable Enterprise Premium versi\\u00f3n 10.23, fue vulnerable a ataques de tipo XML External Entity Injection (XXE) que podr\\u00edan ser aprovechados por un usuario no identificado. Fue posible para un atacante utilizar una vulnerabilidad en la configuraci\\u00f3n del procesador XML para leer cualquier archivo en el sistema host. Debido a que todas las credenciales fueron almacenadas en un archivo de texto sin cifrar, fue posible robar las credenciales de todos los usuarios (incluyendo los usuarios con privilegios m\\u00e1s altos).\"}]",
      "id": "CVE-2019-12924",
      "lastModified": "2024-11-21T04:23:49.943",
      "metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:N/A:N\", \"baseScore\": 5.0, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"NONE\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 10.0, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
      "published": "2019-07-08T21:15:10.037",
      "references": "[{\"url\": \"http://www.mailenable.com/Premium-ReleaseNotes.txt\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/\", \"source\": \"cve@mitre.org\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}, {\"url\": \"http://www.mailenable.com/Premium-ReleaseNotes.txt\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Vendor Advisory\"]}, {\"url\": \"https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Release Notes\", \"Third Party Advisory\"]}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-311\"}, {\"lang\": \"en\", \"value\": \"CWE-611\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2019-12924\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2019-07-08T21:15:10.037\",\"lastModified\":\"2024-11-21T04:23:49.943\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"MailEnable Enterprise Premium 10.23 was vulnerable to XML External Entity Injection (XXE) attacks that could be exploited by an unauthenticated user. It was possible for an attacker to use a vulnerability in the configuration of the XML processor to read any file on the host system. Because all credentials were stored in a cleartext file, it was possible to steal all users\u0027 credentials (including the highest privileged users).\"},{\"lang\":\"es\",\"value\":\"MailEnable Enterprise Premium versi\u00f3n 10.23, fue vulnerable a ataques de tipo XML External Entity Injection (XXE) que podr\u00edan ser aprovechados por un usuario no identificado. Fue posible para un atacante utilizar una vulnerabilidad en la configuraci\u00f3n del procesador XML para leer cualquier archivo en el sistema host. Debido a que todas las credenciales fueron almacenadas en un archivo de texto sin cifrar, fue posible robar las credenciales de todos los usuarios (incluyendo los usuarios con privilegios m\u00e1s altos).\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:N/A:N\",\"baseScore\":5.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"NONE\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":10.0,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-311\"},{\"lang\":\"en\",\"value\":\"CWE-611\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\",\"versionStartIncluding\":\"6.0\",\"versionEndExcluding\":\"6.90\",\"matchCriteriaId\":\"F7B4998A-BD40-4D0D-AC78-0457F40067C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\",\"versionStartIncluding\":\"7.0\",\"versionEndExcluding\":\"7.62\",\"matchCriteriaId\":\"9B9FFD5C-6982-4B54-BED3-DBAF30490439\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\",\"versionStartIncluding\":\"8.00\",\"versionEndExcluding\":\"8.64\",\"matchCriteriaId\":\"1FAD50A0-D3E4-40B7-80DB-AD741B1BE1E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.83\",\"matchCriteriaId\":\"5DCC3F1A-6A49-4A2B-B973-1A44EFEF675B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:mailenable:mailenable:*:*:*:*:premium:*:*:*\",\"versionStartIncluding\":\"10.00\",\"versionEndExcluding\":\"10.24\",\"matchCriteriaId\":\"55F2A0A6-2BA0-4176-B9A2-9E2A86635BC2\"}]}]}],\"references\":[{\"url\":\"http://www.mailenable.com/Premium-ReleaseNotes.txt\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/\",\"source\":\"cve@mitre.org\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]},{\"url\":\"http://www.mailenable.com/Premium-ReleaseNotes.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Vendor Advisory\"]},{\"url\":\"https://www.nccgroup.trust/uk/our-research/technical-advisory-multiple-vulnerabilities-in-mailenable/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Release Notes\",\"Third Party Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…