First published: Wed Dec 31 2003(Updated: )
CommuniGate Pro 3.1 through 4.0.6 sends the session ID in the referer field for an HTTP request for an image, which allows remote attackers to hijack mail sessions via an e-mail with an IMG tag that references a malicious URL that captures the referer.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Communigate Pro | =3.1 | |
Communigate Pro | =3.2.4 | |
Communigate Pro | =3.2_b5 | |
Communigate Pro | =3.2_b7 | |
Communigate Pro | =3.3.2 | |
Communigate Pro | =3.3_b1 | |
Communigate Pro | =3.3_b2 | |
Communigate Pro | =3.4_b3 | |
Communigate Pro | =4.0.1 | |
Communigate Pro | =4.0.2 | |
Communigate Pro | =4.0.3 | |
Communigate Pro | =4.0.6 | |
Communigate Pro | =4.0_b2 | |
Communigate Pro | =4.0_b3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-1481 is considered a high-severity vulnerability due to the potential for remote session hijacking.
To fix CVE-2003-1481, update CommuniGate Pro to a version that does not expose session IDs in the referer field.
Versions 3.1 through 4.0.6 of CommuniGate Pro are affected by CVE-2003-1481.
CVE-2003-1481 can be exploited by attackers who craft malicious emails containing IMG tags to capture vulnerable session IDs.
A temporary workaround may involve disabling the display of external images in emails to mitigate the risk of session hijacking.