First published: Mon Dec 31 2001(Updated: )
Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IPSWITCH IMail | =6.4 | |
IPSWITCH IMail | =7.0.2 | |
IPSWITCH IMail | =7.0.1 | |
IPSWITCH IMail | =6.1 | |
IPSWITCH IMail | =6.3 | |
IPSWITCH IMail | =7.0.4 | |
IPSWITCH IMail | =6.2 | |
IPSWITCH IMail | =7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1211 is classified as a critical vulnerability due to the potential for attackers with administrator privileges to access and manipulate user information across different domains.
To fix CVE-2001-1211, upgrade to a later version of Ipswitch IMail that addresses this vulnerability, specifically version 7.0.5 or later.
CVE-2001-1211 affects Ipswitch IMail versions 6.1 through 7.0.4.
An attacker can read and modify alias and mailing list information for other domains hosted on the same Ipswitch IMail server.
Organizations using affected versions of Ipswitch IMail are at risk, especially if they have administrative users with compromised credentials.