First published: Mon Jan 08 2018(Updated: )
The "XML Interface to Messaging, Scheduling, and Signaling" (XIMSS) protocol implementation in CommuniGate Pro (CGP) 6.2 suffers from a Missing XIMSS Protocol Validation attack that leads to an email spoofing attack, allowing a malicious authenticated attacker to send a message from any source email address. The attack uses an HTTP POST request to a /Session URI, and interchanges the XML From and To elements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Communigate Pro | =6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2018-3815 is categorized as a critical vulnerability since it allows email spoofing by authenticated attackers.
To address CVE-2018-3815, upgrade CommuniGate Pro to a version later than 6.2 where this vulnerability has been patched.
CVE-2018-3815 can lead to unauthorized email spoofing, which may compromise communication integrity and trust.
CVE-2018-3815 affects users of CommuniGate Pro version 6.2 and earlier versions.
CVE-2018-3815 is considered a remote vulnerability as it allows an authenticated attacker to exploit it from a distance.