MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
Advisories
Source ID Title
EUVD EUVD EUVD-2019-4503 MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-04T23:32:55.635Z

Reserved: 2019-06-20T00:00:00

Link: CVE-2019-12926

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2019-07-08T22:15:11.737

Modified: 2024-11-21T04:23:50.250

Link: CVE-2019-12926

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.