Ability Mail Server 4.2.6 has Persistent Cross Site Scripting (XSS) via the body e-mail body. To exploit the vulnerability, the victim must open an email with malicious Javascript inserted into the body of the email as an iframe.
References
Link | Resource |
---|---|
https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html | Exploit Third Party Advisory VDB Entry |
Configurations
History
21 Nov 2024, 04:51
Type | Values Removed | Values Added |
---|---|---|
References | () https://packetstormsecurity.com/files/151958/Ability-Mail-Server-4.2.6-Cross-Site-Scripting.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2019-03-12 19:29
Updated : 2024-11-21 04:51
NVD link : CVE-2019-9557
Mitre link : CVE-2019-9557
CVE.ORG link : CVE-2019-9557
JSON object : View
Products Affected
codecrafters
- ability_mail_server
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')