[<prev] [next>] [day] [month] [year] [list]
Message-ID: <201511270921394770571@dbappsecurity.com.cn>
Date: Fri, 27 Nov 2015 09:21:39 +0800
From: shack.li <shack.li@...ppsecurity.com.cn>
To: fulldisclosure <fulldisclosure@...lists.org>
Cc: bugtrace <bugtrace@...il.com>, bugtraq <bugtraq@...urityfocus.com>
Subject: [FD] [CVE-2015-6942] CoreMail XT3.0 Stored XSS
Application: CoreMail
Versions Affected: XT3.0
Vendor URL: http://www.coremail.cn/
Bugs: Stored XSS
Author:shack.li(DBAPPSecurity Ltd)
Description:
Coremail mail system was born in 1999, is widely used in network operators, large enterprises, government institutions, colleges and universities and other mail systems, so far, the user has more than 700000000,the official website.
Create a document, insert a hyperlink, hyperlink for executing the JavaScript test code "javascript:alert ()".
Then create a mail and upload attachments, and then send them to the other users who need them. When other users online preview documents, click the hyperlink, Attack code will be executed
step one:
step two:
----------------------------------------------------------------------------------------------------------------------------------
E-mail:shack.li@...ppsecurity.com.cn
DBAppSecurity Ltd
www.dbappsecurity.com.cn
Download attachment "Catch(11-26-20-3(11-27-09-18-45).jpg" of type "image/jpeg" (124688 bytes)
Download attachment "CatchE627(11-26-(11-27-09-18-45).jpg" of type "image/jpeg" (89630 bytes)
_______________________________________________
Sent through the Full Disclosure mailing list
https://nmap.org/mailman/listinfo/fulldisclosure
Web Archives & RSS: http://seclists.org/fulldisclosure/
Powered by blists - more mailing lists