CVE-2017-14322
Published on: 10/18/2017 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:26:44 PM UTC
Certain versions of Email Marketer from Interspire contain the following vulnerability:
The function in charge to check whether the user is already logged in init.php in Interspire Email Marketer (IEM) prior to 6.1.6 allows remote attackers to bypass authentication and obtain administrative access by using the IEM_CookieLogin cookie with a specially crafted value.
- CVE-2017-14322 has been assigned by
[email protected] to track the vulnerability - currently rated as CRITICAL severity.
CVSS3 Score: 9.8 - CRITICAL
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | NONE | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 10 - HIGH
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | LOW | NONE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
COMPLETE | COMPLETE | COMPLETE |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Narrative of an incident response – From compromise to the publication of the weakness - Infoteam SA | Broken Link web.archive.org text/html Inactive LinkNot Archived |
![]() |
Interspire Email Marketer < 6.1.6 - Remote Admin Authentication Bypass - PHP webapps Exploit | Exploit Third Party Advisory VDB Entry www.exploit-db.com Proof of Concept text/html |
![]() |
Full Disclosure: [CVE-2017-14322] Interspire Email Marketer - Remote Admin Authentication Bypass | Mailing List Third Party Advisory seclists.org text/html |
![]() |
There are currently no QIDs associated with this CVE
Exploit/POC from Github
CVE-2017-14322 Interspire Email Marketer (emailmarketer) Exploit
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Interspire | Email Marketer | All | All | All | All |
- cpe:2.3:a:interspire:email_marketer:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE