Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | N/A |
CWE-ID | CWE-200 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
SMTP Authentication Support Web applications / Modules and components for CMS |
Vendor | Chuva Inc. |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU7260
Risk: Low
CVSSv3.1: 5.1 [CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:L/I:N/A:N/E:U/RL:O/RC:C]
CVE-ID: N/A
CWE-ID:
CWE-200 - Information exposure
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to obtain potentially sensitive information.
The vulnerability resides within the SMTP Authentication Support module for Drupal, when configured to run in debug mode. The modules logs sensitive information, which can be accessible by remote unauthenticated users.
Update to version 7.x-1.7 or 8.x-1.0-beta3.
Vulnerable software versionsSMTP Authentication Support: 7.x-1.0 - 8.x-1.0-beta2
CPE2.3http://www.drupal.org/node/2890357
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.