First published: Sat Dec 23 2006(Updated: )
Cross-site request forgery (CSRF) vulnerability in util.pl in @Mail WebMail 4.51, and util.php in 5.x before 5.03, allows remote attackers to modify arbitrary settings and perform unauthorized actions as an arbitrary user, as demonstrated using a settings action in the SRC attribute of an IMG element in an HTML e-mail.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Jason Flatt Basic Webmail | =3.0 | |
Jason Flatt Basic Webmail | =4.51 | |
Jason Flatt Basic Webmail | =4.0 | |
=3.0 | ||
=4.0 | ||
=4.51 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6701 is considered a medium severity vulnerability due to its ability to allow unauthorized actions by remote attackers.
To fix CVE-2006-6701, upgrade to the latest version of Atmail WebMail that addresses the CSRF vulnerability.
CVE-2006-6701 affects Atmail WebMail versions 3.0, 4.0, and 4.51.
An attacker exploiting CVE-2006-6701 can modify settings and perform unauthorized actions as any user within the affected application.
CVE-2006-6701 can be easily exploited using CSRF attack techniques, such as embedding malicious URLs.