vendor:
AMS WebMail
by:
Exploit Database
8,8
CVSS
HIGH
Password Reset Vulnerability
20
CWE
Product Name: AMS WebMail
Affected Version From: AMS WebMail 2.0
Affected Version To: AMS WebMail 2.0
Patch Exists: YES
Related CWE: CVE-2009-3223
CPE: a:ams_software:ams_webmail:2.0
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows Server 2003
2009
AMS WebMail Password Reset Vulnerability
This vulnerability allows an attacker to reset the password of a user in AMS WebMail. The attacker can exploit this vulnerability by setting up a malicious web page with a JavaScript file that will send a request to the AMS WebMail server. The request will contain the user's email address and a reset password token. The attacker can then use the token to reset the user's password. The vulnerability is caused by the lack of proper input validation in the AMS WebMail server.
Mitigation:
The vendor has released a patch to address this vulnerability. It is recommended to apply the patch as soon as possible.