First published: Wed Oct 28 2020(Updated: )
An Insecure Direct Object Reference vulnerability in Citadel WebCit through 926 allows authenticated remote attackers to read someone else's emails via the msg_confirm_move template. NOTE: this was reported to the vendor in a publicly archived "Multiple Security Vulnerabilities in WebCit 926" thread.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citadel WebCit | <=926 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-27742 is an Insecure Direct Object Reference vulnerability in Citadel WebCit through version 926.
CVE-2020-27742 allows authenticated remote attackers to read someone else's emails using the msg_confirm_move template.
CVE-2020-27742 has a severity rating of 6.5 (medium).
To fix CVE-2020-27742, users should apply the latest version (926) of Citadel WebCit.
More information about CVE-2020-27742 can be found at the following references: [Reference 1](http://uncensored.citadel.org/readfwd?go=Citadel%20Security?start_reading_at=4592834), [Reference 2](https://www.citadel.org/).