Description
Sendio before 7.2.4 includes the session identifier in URLs in emails, which allows remote attackers to obtain sensitive information and hijack sessions by reading the jsessionid parameter in the Referrer HTTP header.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Core Security · textwebappsjsp
https://www.exploit-db.com/exploits/37114
References (5)
Core 5
Core References
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/May/95
Exploit x_refsource_misc
http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535592/100/0/threaded
Vendor Advisory x_refsource_confirm
http://www.sendio.com/software-release-history/
Exploit exploit
x_refsource_exploit-db
http://www.exploit-db.com/exploits/37114
Scores
EPSS
0.1448
EPSS Percentile
94.5%
Details
CWE
CWE-200
Status
published
Products (1)
sendio/sendio
< 7.2.3
Published
Jun 02, 2015
Tracked Since
Feb 18, 2026