SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.
References
Configurations
History
21 Nov 2024, 02:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf - Third Party Advisory | |
References | () https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails/ - Third Party Advisory | |
References | () https://www.smartertools.com/smartermail/release-notes/13 - Release Notes |
Information
Published : 2019-01-16 16:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9276
Mitre link : CVE-2015-9276
CVE.ORG link : CVE-2015-9276
JSON object : View
Products Affected
smartertools
- smartermail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')