First published: Fri Aug 13 2021(Updated: )
The MiCollab Client Service component in Mitel MiCollab before 9.3 could allow an attacker to get source code information (disclosing sensitive application data) due to insufficient output sanitization. A successful exploit could allow an attacker to view source code methods.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Mitel MiCollab, MiVoice Business Express | <9.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this security advisory is CVE-2021-32072.
The affected software for this vulnerability is Mitel MiCollab before version 9.3.
The severity of CVE-2021-32072 is medium.
CVE-2021-32072 allows an attacker to get source code information and view source code methods due to insufficient output sanitization in the MiCollab Client Service component of Mitel MiCollab.
To mitigate the risk of CVE-2021-32072, it is recommended to upgrade to Mitel MiCollab version 9.3 or later.