Vulnerability Description
Cross-site request forgery (CSRF) vulnerability in util.pl in @Mail WebMail 4.51, and util.php in 5.x before 5.03, allows remote attackers to modify arbitrary settings and perform unauthorized actions as an arbitrary user, as demonstrated using a settings action in the SRC attribute of an IMG element in an HTML e-mail.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Atmail | Atmail Webmail | 3.0 |
Related Weaknesses (CWE)
References
- http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0512.html
- http://secunia.com/advisories/23472Vendor Advisory
- http://secunia.com/advisories/25328Vendor Advisory
- http://securitytracker.com/id?1017435
- http://terra.calacode.com/mail/docs/changelog.html
- http://www.netragard.com/html/recent_research.html
- http://www.netragard.com/pdfs/research/ATMAIL-XSRF-ADVISORY-20061206.txt
- http://www.securityfocus.com/archive/1/458109/100/100/threaded
- http://www.vupen.com/english/advisories/2007/1864
- https://exchange.xforce.ibmcloud.com/vulnerabilities/31259
- http://archives.neohapsis.com/archives/fulldisclosure/2007-01/0512.html
- http://secunia.com/advisories/23472Vendor Advisory
- http://secunia.com/advisories/25328Vendor Advisory
- http://securitytracker.com/id?1017435
- http://terra.calacode.com/mail/docs/changelog.html
FAQ
What is CVE-2006-6701?
CVE-2006-6701 is a vulnerability with a CVSS score of 7.5 (HIGH). Cross-site request forgery (CSRF) vulnerability in util.pl in @Mail WebMail 4.51, and util.php in 5.x before 5.03, allows remote attackers to modify arbitrary settings and perform unauthorized actions...
How severe is CVE-2006-6701?
CVE-2006-6701 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-6701?
Check the references section above for vendor advisories and patch information. Affected products include: Atmail Atmail Webmail.