lists.openwall.net | lists / announce owl-users owl-dev john-users john-dev passwdqc-users yescrypt popa3d-users / oss-security kernel-hardening musl sabotage tlsify passwords / crypt-dev xvendor / Bugtraq Full-Disclosure linux-kernel linux-netdev linux-ext4 linux-hardening linux-cve-announce PHC | |
Open Source and information security mailing list archives
| ||
|
Message-ID: <201511270921394770571@dbappsecurity.com.cn> Date: Fri, 27 Nov 2015 09:21:39 +0800 From: shack.li <shack.li@...ppsecurity.com.cn> To: fulldisclosure <fulldisclosure@...lists.org> Cc: bugtrace <bugtrace@...il.com>, bugtraq <bugtraq@...urityfocus.com> Subject: [FD] [CVE-2015-6942] CoreMail XT3.0 Stored XSS Application: CoreMail Versions Affected: XT3.0 Vendor URL: http://www.coremail.cn/ Bugs: Stored XSS Author:shack.li(DBAPPSecurity Ltd) Description: Coremail mail system was born in 1999, is widely used in network operators, large enterprises, government institutions, colleges and universities and other mail systems, so far, the user has more than 700000000,the official website. Create a document, insert a hyperlink, hyperlink for executing the JavaScript test code "javascript:alert ()". Then create a mail and upload attachments, and then send them to the other users who need them. When other users online preview documents, click the hyperlink, Attack code will be executed step one: step two: ---------------------------------------------------------------------------------------------------------------------------------- E-mail:shack.li@...ppsecurity.com.cn DBAppSecurity Ltd www.dbappsecurity.com.cn Download attachment "Catch(11-26-20-3(11-27-09-18-45).jpg" of type "image/jpeg" (124688 bytes) Download attachment "CatchE627(11-26-(11-27-09-18-45).jpg" of type "image/jpeg" (89630 bytes) _______________________________________________ Sent through the Full Disclosure mailing list https://nmap.org/mailman/listinfo/fulldisclosure Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists