vendor:
WebMail Lite
by:
Pablo '7days' Riberio
8,8
CVSS
HIGH
Cross-Site Request Forgery (CSRF)
352
CWE
Product Name: WebMail Lite
Affected Version From: <= 7.0.1
Affected Version To: <= 7.0.1
Patch Exists: YES
Related CWE: N/A
CPE: a:afterlogic:webmail_lite
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows/Internet Explorer
2020
AfterLogic WebMail Lite PHP CSRF
This exploit allows an attacker to reset the admin password of AfterLogic WebMail Lite version <= 7.0.1 via Cross-Site Request Forgery (CSRF). The exploit can be found by searching for 'inurl:webmail/adminpanel/index.php?submit' using the DuckDuckGo search engine.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to update to the latest version of AfterLogic WebMail Lite.