lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <CALOy=8AVvpGFNYmjZq=kc=0o8Qc0aHPc3YvotBygvspRrMdRGw@mail.gmail.com> Date: Tue, 1 Sep 2020 11:50:53 +0200 From: Balázs Hambalkó <hambalko.balazs@...il.com> To: fulldisclosure@...lists.org Subject: [FD] Roundcube issue - Auth bypass via Improper Session Management Hi, Title: Authentication bypass via Improper Session Management Product: RoundcubeMail Tested version: 1.4.4 - 1.4.8 CVE: in progress Credit: Balazs Hambalko, IT Security Consultant Risk: The lack of proper session validation could lead an attacker to access the victim user's emails. Issue fixed: in next release URL: https://github.com/roundcube/roundcubemail/issues/7576 _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists