CVE-2019-10229
Published on: 12/31/2019 12:00:00 AM UTC
Last Modified on: 03/23/2021 11:27:38 PM UTC
Certain versions of Mailstore from Mailstore contain the following vulnerability:
An issue was discovered in MailStore Server (and Service Provider Edition) 9.x through 11.x before 11.2.2. When the directory service (for synchronizing and authenticating users) is set to Generic LDAP, an attacker is able to login as an existing user with an arbitrary password on the second login attempt.
- CVE-2019-10229 has been assigned by
[email protected] to track the vulnerability - currently rated as HIGH severity.
CVSS3 Score: 8.8 - HIGH
Attack Vector ⓘ |
Attack Complexity |
Privileges Required |
User Interaction |
---|---|---|---|
NETWORK | LOW | LOW | NONE |
Scope | Confidentiality Impact |
Integrity Impact |
Availability Impact |
UNCHANGED | HIGH | HIGH | HIGH |
CVSS2 Score: 6 - MEDIUM
Access Vector ⓘ |
Access Complexity |
Authentication |
---|---|---|
NETWORK | MEDIUM | SINGLE |
Confidentiality Impact |
Integrity Impact |
Availability Impact |
PARTIAL | PARTIAL | PARTIAL |
CVE References
Description | Tags ⓘ | Link |
---|---|---|
Vendor Advisory help.mailstore.com text/plain |
![]() |
There are currently no QIDs associated with this CVE
Known Affected Configurations (CPE V2.3)
Type | Vendor | Product | Version | Update | Edition | Language |
---|---|---|---|---|---|---|
Application | Mailstore | Mailstore | All | All | All | All |
Application | Mailstore | Mailstore Server | All | All | All | All |
- cpe:2.3:a:mailstore:mailstore:*:*:*:*:service_provider:*:*:*:
- cpe:2.3:a:mailstore:mailstore_server:*:*:*:*:*:*:*:*:
No vendor comments have been submitted for this CVE