Vulnerability Description
WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and read the user's email.
CVSS Score
LOW
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Alt-N | Mdaemon | 2.8 |
References
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&PPatchVendor Advisory
- http://www.securityfocus.com/bid/1553PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5070
- http://www.ntbugtraq.com/default.asp?pid=36&sid=1&A2=ind0008&L=ntbugtraq&F=&S=&PPatchVendor Advisory
- http://www.securityfocus.com/bid/1553PatchVendor Advisory
- https://exchange.xforce.ibmcloud.com/vulnerabilities/5070
FAQ
What is CVE-2000-0716?
CVE-2000-0716 is a vulnerability with a CVSS score of 2.6 (LOW). WorldClient email client in MDaemon 2.8 includes the session ID in the referer field of an HTTP request when the user clicks on a URL, which allows the visited web site to hijack the session ID and re...
How severe is CVE-2000-0716?
CVE-2000-0716 has been rated LOW with a CVSS base score of 2.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2000-0716?
Check the references section above for vendor advisories and patch information. Affected products include: Alt-N Mdaemon.