Description
The Web interface in Sendio before 7.2.4 does not properly handle sessions, which allows remote authenticated users to obtain sensitive information from other users' sessions via a large number of requests.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Core Security · textwebappsjsp
https://www.exploit-db.com/exploits/37114
References (5)
Core 5
Core References
Exploit mailing-list
x_refsource_fulldisc
http://seclists.org/fulldisclosure/2015/May/95
Exploit x_refsource_misc
http://packetstormsecurity.com/files/132022/Sendio-ESP-Information-Disclosure.html
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/535592/100/0/threaded
Exploit exploit
x_refsource_exploit-db
https://www.exploit-db.com/exploits/37114/
Vendor Advisory x_refsource_confirm
http://www.sendio.com/software-release-history/
Scores
EPSS
0.0974
EPSS Percentile
93.0%
Details
CWE
CWE-200
Status
published
Products (1)
sendio/sendio
< 7.2.3
Published
Jun 02, 2015
Tracked Since
Feb 18, 2026