vendor:
eM Client for Windows
by:
loneferret
8,8
CVSS
HIGH
Stored XSS
79
CWE
Product Name: eM Client for Windows
Affected Version From: 5.0.18025.0
Affected Version To: 5.0.18025.0
Patch Exists: YES
Related CWE: N/A
CPE: a:emclient:em_client
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Windows XP Pro SP3 Eng., Windows 7 Pro SP1 Eng.
2013
Stored XSS in eM Client for Windows
eM Client for Windows is vulnerable to stored XSS. An attacker can send an email with a malicious payload to the victim, which when opened or viewed, will execute the payload and cause an alert box to appear. The injection point is the body of the email.
Mitigation:
Upgrade/update to the latest version of eM Client for Windows.