CVE-2015-9276

SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.
Configurations

Configuration 1 (hide)

cpe:2.3:a:smartertools:smartermail:*:*:*:*:*:*:*:*

History

21 Nov 2024, 02:40

Type Values Removed Values Added
References () https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf - Third Party Advisory () https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf - Third Party Advisory
References () https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails/ - Third Party Advisory () https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails/ - Third Party Advisory
References () https://www.smartertools.com/smartermail/release-notes/13 - Release Notes () https://www.smartertools.com/smartermail/release-notes/13 - Release Notes

Information

Published : 2019-01-16 16:29

Updated : 2024-11-21 02:40


NVD link : CVE-2015-9276

Mitre link : CVE-2015-9276

CVE.ORG link : CVE-2015-9276


JSON object : View

Products Affected

smartertools

  • smartermail
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')