First published: Fri Oct 12 2001(Updated: )
Ipswitch IMail 7.04 and earlier stores a user's session ID in a URL, which could allow remote attackers to hijack sessions by obtaining the URL, e.g. via an HTML email that causes the Referrer to be sent to a URL under the attacker's control.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch IMail | =6.0.6 | |
Ipswitch IMail | =6.0.2 | |
Ipswitch IMail | =7.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1286 has a medium severity rating due to the potential for session hijacking.
To fix CVE-2001-1286, it is recommended to upgrade to Ipswitch IMail versions later than 7.0.4.
CVE-2001-1286 affects Ipswitch IMail versions 6.0.2, 6.0.6, and 7.0.4 and earlier.
CVE-2001-1286 is a session management vulnerability that allows session hijacking.
Yes, CVE-2001-1286 can be exploited remotely if an attacker can obtain the session ID through crafted URLs.