CVE-2001-1211 (GCVE-0-2001-1211)
Vulnerability from cvelistv5 – Published: 2002-03-15 05:00 – Updated: 2024-08-08 04:44
VLAI?
Summary
Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | ||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-08T04:44:08.288Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm"
},
{
"name": "3766",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/3766"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm"
},
{
"name": "imail-admin-domain-change(7752)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "http://www.iss.net/security_center/static/7752.php"
},
{
"name": "20011231 IMail Web Service User Aliases / Mailing Lists Admin Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/247786"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2001-12-31T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2002-03-22T10:00:00",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm"
},
{
"name": "3766",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/3766"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm"
},
{
"name": "imail-admin-domain-change(7752)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "http://www.iss.net/security_center/static/7752.php"
},
{
"name": "20011231 IMail Web Service User Aliases / Mailing Lists Admin Vulnerability",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/247786"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2001-1211",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm",
"refsource": "MISC",
"url": "http://support.ipswitch.com/kb/IM-20011219-DM01.htm"
},
{
"name": "3766",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/3766"
},
{
"name": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm",
"refsource": "MISC",
"url": "http://support.ipswitch.com/kb/IM-20020301-DM02.htm"
},
{
"name": "imail-admin-domain-change(7752)",
"refsource": "XF",
"url": "http://www.iss.net/security_center/static/7752.php"
},
{
"name": "20011231 IMail Web Service User Aliases / Mailing Lists Admin Vulnerability",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/247786"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2001-1211",
"datePublished": "2002-03-15T05:00:00",
"dateReserved": "2002-03-15T00:00:00",
"dateUpdated": "2024-08-08T04:44:08.288Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EAEA8FB7-3D42-4A39-BCCD-2DE3BC3EAC19\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12658962-53E6-49EB-83EF-04A1B5D693B3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6DA61FCA-BA3C-4014-9C4B-4D4ED65AB07A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D0BC7230-2A64-43CE-B041-22F2E4A559A9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5700938-EE34-4A16-BE98-74EAA4A48249\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCF543E9-F893-4086-BD97-ECB43EEF26BC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F3818F47-0A00-4984-857D-DBF87DDB71B4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"84CE3C80-C0D3-4F7C-BF12-10111281DC3D\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.\"}, {\"lang\": \"es\", \"value\": \"Ipswitch IMail 7.0.4 y versiones anteriores permiten a atacantes con privilegios de administrador, leer y modificar los alias de los usuarios y la informaci\\u00f3n de las listas de correo de otros dominios albergados en el mismo servidor mediante:(1) aliasadmin o(2) programas CGI listadm1, los cuales no verifica adecuadamente que un administrador realmente lo es en ese dominio.\"}]",
"id": "CVE-2001-1211",
"lastModified": "2024-11-20T23:37:09.567",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:L/Au:N/C:P/I:P/A:P\", \"baseScore\": 7.5, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"LOW\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"HIGH\", \"exploitabilityScore\": 10.0, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": true, \"userInteractionRequired\": false}]}",
"published": "2001-12-31T05:00:00.000",
"references": "[{\"url\": \"http://support.ipswitch.com/kb/IM-20011219-DM01.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://support.ipswitch.com/kb/IM-20020301-DM02.htm\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.iss.net/security_center/static/7752.php\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/247786\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/3766\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://support.ipswitch.com/kb/IM-20011219-DM01.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://support.ipswitch.com/kb/IM-20020301-DM02.htm\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.iss.net/security_center/static/7752.php\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/247786\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/3766\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-Other\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2001-1211\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2001-12-31T05:00:00.000\",\"lastModified\":\"2025-04-03T01:03:51.193\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Ipswitch IMail 7.0.4 and earlier allows attackers with administrator privileges to read and modify user alias and mailing list information for other domains hosted by the same server via the (1) aliasadmin or (2) listadm1 CGI programs, which do not properly verify that an administrator is the administrator for the target domain.\"},{\"lang\":\"es\",\"value\":\"Ipswitch IMail 7.0.4 y versiones anteriores permiten a atacantes con privilegios de administrador, leer y modificar los alias de los usuarios y la informaci\u00f3n de las listas de correo de otros dominios albergados en el mismo servidor mediante:(1) aliasadmin o(2) programas CGI listadm1, los cuales no verifica adecuadamente que un administrador realmente lo es en ese dominio.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EAEA8FB7-3D42-4A39-BCCD-2DE3BC3EAC19\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12658962-53E6-49EB-83EF-04A1B5D693B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6DA61FCA-BA3C-4014-9C4B-4D4ED65AB07A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D0BC7230-2A64-43CE-B041-22F2E4A559A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:7.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5700938-EE34-4A16-BE98-74EAA4A48249\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:7.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCF543E9-F893-4086-BD97-ECB43EEF26BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:7.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F3818F47-0A00-4984-857D-DBF87DDB71B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:ipswitch:imail:7.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84CE3C80-C0D3-4F7C-BF12-10111281DC3D\"}]}]}],\"references\":[{\"url\":\"http://support.ipswitch.com/kb/IM-20011219-DM01.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://support.ipswitch.com/kb/IM-20020301-DM02.htm\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.iss.net/security_center/static/7752.php\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/247786\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/3766\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://support.ipswitch.com/kb/IM-20011219-DM01.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://support.ipswitch.com/kb/IM-20020301-DM02.htm\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.iss.net/security_center/static/7752.php\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/247786\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/3766\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…