CVE-2014-0999

Sendio < 7.2.3 - Information Disclosure

Title source: rule
STIX 2.1

Description

Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.

Exploits (1)

exploitdb WORKING POC VERIFIED
by Core Security · textwebappsjsp
https://www.exploit-db.com/exploits/37114

References (5)

Core 5
Core References
Exploit mailing-list x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/May/95
Third Party Advisory, VDB Entry mailing-list x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535592/100/0/threaded
Vendor Advisory x_refsource_confirm
http://www.sendio.com/software-release-history/
Exploit exploit x_refsource_exploit-db
http://www.exploit-db.com/exploits/37114

Scores

EPSS 0.1448
EPSS Percentile 94.5%

Details

CWE
CWE-200
Status published
Products (1)
sendio/sendio < 7.2.3
Published Jun 02, 2015
Tracked Since Feb 18, 2026