Vulnerability Note VU#136612

Mutare Software Enabled VoiceMail (EVM) system web interface cross-site request forgery vulnerabilities

Original Release date: 23 Feb 2011 | Last revised: 23 Feb 2011

Overview

The Mutare Software Enabled VoiceMail (EVM) system web interface is susceptible to cross-site request forgery and cross-site scripting attacks.

Description

The Mutare Software Enabled VoiceMail (EVM) system web interface allows the user to change their Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails. These HTTP requests do not perform proper validity checks and are susceptible to cross-site request forgery and cross-site scripting attacks.

Impact

An attacker can change a user's Enabled VoiceMail (EVM) PIN, delete their voice messages, and add or modify their email delivery address for voicemails, if able to trick a user into visiting a specially crafted link.

Solution

We are currently unaware of a practical solution to this problem.

Restrict access

Restrict network access to the Mutare Software Enabled VoiceMail (EVM) system web interface and other devices using open protocols like HTTP.

Vendor Information (Learn More)

VendorStatusDate NotifiedDate Updated
Mutare SoftwareAffected22 Nov 201006 Jan 2011
If you are a vendor and your product is affected, let us know.

CVSS Metrics (Learn More)

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A N/A

References

  • None

Credit

Thanks to Travis Lee for reporting this vulnerability.

This document was written by Michael Orlando.

Other Information

  • CVE IDs: Unknown
  • Date Public: 23 Feb 2011
  • Date First Published: 23 Feb 2011
  • Date Last Updated: 23 Feb 2011
  • Severity Metric: 2.16
  • Document Revision: 14

Feedback

If you have feedback, comments, or additional information about this vulnerability, please send us email.