Vulnerability Description
totemomail Encryption Gateway before 6.0_b567 allows remote attackers to obtain sensitive information about user sessions and encryption key material via a JSONP hijacking attack.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Totemo | Totemomail Encryption Gateway | < 6.0.0_b567 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/147637/Totemomail-Encryption-Gateway-6.0.0_Technical DescriptionThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542016/100/0/threaded
- https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-Technical DescriptionThird Party Advisory
- http://packetstormsecurity.com/files/147637/Totemomail-Encryption-Gateway-6.0.0_Technical DescriptionThird Party AdvisoryVDB Entry
- http://www.securityfocus.com/archive/1/542016/100/0/threaded
- https://www.compass-security.com/fileadmin/Datein/Research/Advisories/CSNC-2018-Technical DescriptionThird Party Advisory
FAQ
What is CVE-2018-6562?
CVE-2018-6562 is a vulnerability with a CVSS score of 7.5 (HIGH). totemomail Encryption Gateway before 6.0_b567 allows remote attackers to obtain sensitive information about user sessions and encryption key material via a JSONP hijacking attack.
How severe is CVE-2018-6562?
CVE-2018-6562 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-6562?
Check the references section above for vendor advisories and patch information. Affected products include: Totemo Totemomail Encryption Gateway.