In MailEnable Enterprise Premium 10.23, the potential cross-site request forgery (CSRF) protection mechanism was not implemented correctly and it was possible to bypass it by removing the anti-CSRF token parameter from the request. This could allow an attacker to manipulate a user into unwittingly performing actions within the application (such as sending email, adding contacts, or changing settings) on behalf of the attacker.
| Software | From | Fixed in |
|---|---|---|
| mailenable / mailenable | 6.0 | 6.90 |
| mailenable / mailenable | 7.0 | 7.62 |
| mailenable / mailenable | 8.00 | 8.64 |
| mailenable / mailenable | 9.0 | 9.83 |
| mailenable / mailenable | 10.00 | 10.24 |