vendor:
WebMail Pro
by:
Saeed reza Zamanian
8,8
CVSS
HIGH
Stored XSS
79
CWE
Product Name: WebMail Pro
Affected Version From: <= 7.1.1.1
Affected Version To: <= 7.1.1.1
Patch Exists: YES
Related CWE: CVE-6423
CPE: a:afterlogic:webmail_pro
Metasploit:
https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/microsoft-edge-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6432/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6443/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6447/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6456/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6430/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6433/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6434/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6436/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6437/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6438/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6440/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6442/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6455/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6423/, https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2020-6448/, https://www.rapid7.com/db/?q=CVE-6423&type=&page=2, https://www.rapid7.com/db/?q=CVE-6423&type=&page=2
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: KALI Linux 1.0.5 (Debian) Apache/2.2.22
2014
AfterLogic Pro and Lite <= 7.1.1.1 Stored XSS
AfterLogic WebMail is a browser-based e-mail and collaboration front end, designed to work with your existing messaging solutions. XSS codes can be stored in E-Mail Body. So you can send an email to the Victim with below payload and steal the victim's cookie.
Mitigation:
Ensure that user input is properly sanitized and validated before being used in the application.