CVE-2019-12924

9.8 CRITICAL
XXE

📋 TL;DR

MailEnable Enterprise Premium 10.23 contains an XML External Entity Injection (XXE) vulnerability that allows unauthenticated attackers to read arbitrary files on the host system. Since credentials are stored in cleartext, this can lead to complete credential theft including administrative accounts. All systems running the vulnerable version are affected.

💻 Affected Systems

Products:
  • MailEnable Enterprise Premium
Versions: 10.23 and earlier versions
Operating Systems: Windows
Default Config Vulnerable: ⚠️ Yes
Notes: All installations with default configuration are vulnerable. The vulnerability exists in the XML processor configuration.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete system compromise via credential theft leading to domain takeover, data exfiltration, and lateral movement within the network.

🟠

Likely Case

Credential theft of all MailEnable users including administrators, potentially leading to email account compromise and further attacks.

🟢

If Mitigated

Limited file read capability but no credential access if proper file permissions and network segmentation are in place.

🌐 Internet-Facing: HIGH - Unauthenticated exploit allows remote attackers to compromise exposed systems.
🏢 Internal Only: HIGH - Internal attackers or malware can exploit this to escalate privileges and move laterally.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Public technical advisory includes exploitation details. XXE attacks are well-documented and tools exist for automated exploitation.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: 10.24 or later

Vendor Advisory: http://www.mailenable.com/Premium-ReleaseNotes.txt

Restart Required: Yes

Instructions:

1. Download MailEnable Enterprise Premium 10.24 or later from vendor website. 2. Backup current configuration and data. 3. Run the installer to upgrade. 4. Restart MailEnable services. 5. Verify the upgrade completed successfully.

🔧 Temporary Workarounds

Disable external entity processing

windows

Configure XML processor to disable external entity resolution

Modify XML parser configuration to set: feature_external_general_entities = false
Set feature_external_parameter_entities = false

Network segmentation

all

Restrict access to MailEnable services to trusted networks only

Configure firewall rules to limit inbound connections to MailEnable ports

🧯 If You Can't Patch

  • Implement strict network access controls to limit exposure to trusted IPs only
  • Monitor for XXE attack patterns in web server logs and implement WAF rules to block XXE payloads

🔍 How to Verify

Check if Vulnerable:

Check MailEnable version in administrative console or registry: HKEY_LOCAL_MACHINE\SOFTWARE\MailEnable\Premium\Version

Check Version:

reg query "HKLM\SOFTWARE\MailEnable\Premium" /v Version

Verify Fix Applied:

Verify version is 10.24 or later and test XXE payloads no longer return file contents

📡 Detection & Monitoring

Log Indicators:

  • XML requests containing DOCTYPE declarations
  • File read attempts via XML entities
  • Unusual file access patterns from MailEnable process

Network Indicators:

  • HTTP requests with XML payloads containing external entity references
  • Outbound connections to malicious DTD servers

SIEM Query:

source="mailenable.log" AND ("DOCTYPE" OR "ENTITY" OR "SYSTEM")

🔗 References

📤 Share & Export