** UNSUPPORTED WHEN ASSIGNED ** WebAdmin Control Panel in Atmail 6.5.0 (a version released in 2012) allows XSS via the format parameter to the default URI. NOTE: This vulnerability only affects products that are no longer supported by the maintainer.
References
Link | Resource |
---|---|
https://help.atmail.com/hc/en-us/sections/115003283988 | Vendor Advisory |
https://medium.com/%40bhattronit96/cve-2021-43574-696041dcab9e |
Configurations
History
17 Nov 2021, 16:43
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:atmail:atmail:6.5.0:*:*:*:*:*:*:* | |
References | (MISC) https://help.atmail.com/hc/en-us/sections/115003283988 - Vendor Advisory | |
References | (MISC) https://medium.com/@bhattronit96/cve-2021-43574-696041dcab9e - Exploit, Third Party Advisory | |
CVSS |
v2 : v3 : |
v2 : 4.3
v3 : 6.1 |
CWE | CWE-79 |
15 Nov 2021, 15:46
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2021-11-15 15:15
Updated : 2024-08-04 04:16
NVD link : CVE-2021-43574
Mitre link : CVE-2021-43574
CVE.ORG link : CVE-2021-43574
JSON object : View
Products Affected
atmail
- atmail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')