MailEnable Enterprise Premium 10.23 did not use appropriate access control checks in a number of areas. As a result, it was possible to perform a number of actions, when logged in as a user, that that user should not have had permission to perform. It was also possible to gain access to areas within the application for which the accounts used were supposed to have insufficient access.
The product does not perform an authorization check when an actor attempts to access a resource or perform an action.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Mailenable | Mailenable | 6.0 (including) | 6.90 (excluding) |
Mailenable | Mailenable | 7.0 (including) | 7.62 (excluding) |
Mailenable | Mailenable | 8.00 (including) | 8.64 (excluding) |
Mailenable | Mailenable | 9.0 (including) | 9.83 (excluding) |
Mailenable | Mailenable | 10.00 (including) | 10.24 (excluding) |
Assuming a user with a given identity, authorization is the process of determining whether that user can access a given resource, based on the user’s privileges and any permissions or other access-control specifications that apply to the resource. When access control checks are not applied, users are able to access data or perform actions that they should not be allowed to perform. This can lead to a wide range of problems, including information exposures, denial of service, and arbitrary code execution.