[ authorization ] [ registration ] [ restore account ]
Contact us
You can contact us by:
0day Today Exploits Market and 0day Exploits Database

Alt-N MDaemon webmail 20.0.0 - (file name) Stored Cross Site Scripting Vulnerability

Author
Kailash Bohara
Risk
[
Security Risk Medium
]
0day-ID
0day-ID-35794
Category
web applications
Date add
08-02-2021
CVE
CVE-2020-18723
Platform
windows
# Exploit Title: Alt-N MDaemon webmail 20.0.0 - 'file name' Stored Cross Site Scripting (XSS)
# Exploit Author: Kailash Bohara
# Vendor Homepage: https://www.altn.com/
# Version: Mdaemon webmail < 20.0.0
# CVE : 2020-18723

1. Rename a file and set it’s name as <img src=x onerror=alert(1)>.jpg
2. Go to New mail, select recipient and the select attachment. Code gets executed as right after upload so it becomes self XSS.
3. Send the mail to recipient and open email from recipent side. Opening just a mail doesn’t executes the code but when the victim clicks on forward button, XSS pop-up is shown.


#  0day.today [2024-11-16]  #