目标达成 感谢每一位支持者 — 我们达成了 100% 目标!

目标: 1000 元 · 已筹: 1000

100.0%

CVE-2021-41083— Dada Mail跨站请求伪造漏洞

CVSS 8.0 · High EPSS 0.17% · P38
获取后续新漏洞提醒登录后订阅

一、 漏洞 CVE-2021-41083 基础信息

漏洞信息

对漏洞内容有疑问?看看神龙的深度分析是否有帮助!
查看神龙十问 ↗

尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。

Vulnerability Title
CSRF Vulnerability in dada-mail 11.15.1 and below
来源: 美国国家漏洞数据库 NVD
Vulnerability Description
Dada Mail is a web-based e-mail list management system. In affected versions a bad actor could give someone a carefully crafted web page via email, SMS, etc, that - when visited, allows them control of the list control panel as if the bad actor was logged in themselves. This includes changing any mailing list password, as well as the Dada Mail Root Password - which could effectively shut out actual list owners of the mailing list and allow the bad actor complete and unfettered control of your mailing list. This vulnerability also affects profile logins. For this vulnerability to work, the target of the bad actor would need to be logged into the list control panel themselves. This CSRF vulnerability in Dada Mail affects all versions of Dada Mail v11.15.1 and below. Although we know of no known CSRF exploits that have happened in the wild, this vulnerability has been confirmed by our testing, and by a third party. Users are advised to update to version 11.16.0.
来源: 美国国家漏洞数据库 NVD
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
来源: 美国国家漏洞数据库 NVD
Vulnerability Type
跨站请求伪造(CSRF)
来源: 美国国家漏洞数据库 NVD
Vulnerability Title
Dada Mail跨站请求伪造漏洞
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Description
Dada Mail是一个现代、成熟和直观的基于 Web 的电子邮件列表管理系统。 Dada Mail 存在跨站请求伪造漏洞,攻击者可以通过电子邮件、短信等方式向某人提供精心制作的网页。
来源: 中国国家信息安全漏洞库 CNNVD
CVSS Information
N/A
来源: 中国国家信息安全漏洞库 CNNVD
Vulnerability Type
N/A
来源: 中国国家信息安全漏洞库 CNNVD

受影响产品

厂商产品影响版本CPE订阅
justingitdada-mail < 11.16.0 -

二、漏洞 CVE-2021-41083 的公开POC

#POC 描述源链接神龙链接
AI 生成 POC高级

未找到公开 POC。

登录以生成 AI POC

三、漏洞 CVE-2021-41083 的情报信息

登录查看更多情报信息。

IV. Related Vulnerabilities

V. Comments for CVE-2021-41083

暂无评论


发表评论