First published: Mon Dec 31 2001(Updated: )
The default "basic" security setting' in config.php for TWIG webmail 2.7.4 and earlier stores cleartext usernames and passwords in cookies, which could allow attackers to obtain authentication information and gain privileges.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
TWIG webmail | <=2.7.4 | |
symfony Twig | <=2.7.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1537 has a high severity level due to the exposure of cleartext usernames and passwords in cookies.
To fix CVE-2001-1537, update to a version of TWIG webmail later than 2.7.4 that has addressed this security issue.
CVE-2001-1537 affects users of TWIG webmail versions 2.7.4 and earlier, as well as Symfony Twig versions up to 2.7.4.
The impact of CVE-2001-1537 could allow attackers to gain unauthorized access to user accounts by stealing authentication information.
A temporary workaround for CVE-2001-1537 includes disabling cookies or implementing alternative secure authentication methods.