Vulnerability Details : CVE-2013-6028
Multiple cross-site request forgery (CSRF) vulnerabilities in Atmail Webmail Server before 7.2 allow remote attackers to hijack the authentication of administrators for requests that (1) add user accounts, (2) modify user accounts, (3) delete user accounts, or (4) stop the product's service.
Vulnerability category: Cross-site request forgery (CSRF)
Exploit prediction scoring system (EPSS) score for CVE-2013-6028
Probability of exploitation activity in the next 30 days: 0.15%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 51 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2013-6028
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
CWE ids for CVE-2013-6028
-
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.Assigned by: nvd@nist.gov (Primary)
References for CVE-2013-6028
-
http://www.kb.cert.org/vuls/id/204950
VU#204950 - Atmail Webmail Server version 7.1.3 contains cross-site scripting (XSS) and cross-site request forgery (CSRF) vulnerabilitiesUS Government Resource
-
http://atmail.com/changelog/
changelog – atmail help centre
Products affected by CVE-2013-6028
- cpe:2.3:a:atmail:atmail:*:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.6.0:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.12:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.11:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.10:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.8:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.13:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.7:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.5:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.6:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.5:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.4:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.3:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.3.0:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.6:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.20.4:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:7.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.6.4:*:*:*:*:*:*:*
- cpe:2.3:a:atmail:atmail:6.6.3:*:*:*:*:*:*:*