First published: Wed Feb 12 2014(Updated: )
Cross-site scripting (XSS) vulnerability in Atmail Webmail Server 6.6.x before 6.6.3 and 7.0.x before 7.0.3 allows remote attackers to inject arbitrary web script or HTML via the PATH_INFO to index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<MessageID>/filenameOriginal/.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | =6.6.0 | |
Phlymail | =6.6.1 | |
Phlymail | =6.6.2 | |
Phlymail | =7.0.0 | |
Phlymail | =7.0.1 | |
Phlymail | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-2585 is classified as a medium severity vulnerability due to its impact on the web application's security.
To fix CVE-2013-2585, upgrade Atmail Webmail Server to version 6.6.3 or 7.0.3 or later.
The impact of CVE-2013-2585 allows attackers to inject arbitrary web script or HTML into the application, leading to potential data theft or session hijacking.
CVE-2013-2585 affects Atmail Webmail Server versions 6.6.0 through 6.6.2 and 7.0.0 through 7.0.1.
There is no known workaround for CVE-2013-2585; upgrading to a patched version is recommended.