First published: Mon May 29 2023(Updated: )
An issue was discovered in Citadel through webcit-926. Meddler-in-the-middle attackers can pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands, injecting cleartext commands into an encrypted user session. This can lead to credential disclosure.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Citadel WebCit | <=926 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29547 is a vulnerability in Citadel WebCit that allows meddler-in-the-middle attackers to inject cleartext commands into an encrypted user session, potentially leading to credential disclosure.
The severity of CVE-2020-29547 is medium with a CVSS score of 5.9.
CVE-2020-29547 affects Citadel WebCit versions up to and including webcit-926.
Meddler-in-the-middle attackers can exploit CVE-2020-29547 by pipeline commands after POP3 STLS, IMAP STARTTLS, or SMTP STARTTLS commands to inject cleartext commands into an encrypted user session.
To fix CVE-2020-29547, it is recommended to update Citadel WebCit to a version that includes a fix for this vulnerability.