First published: Wed Feb 12 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Atmail Webmail Server 7.0.2 allow remote attackers to inject arbitrary web script or HTML via the (1) filter parameter to index.php/mail/mail/listfoldermessages/searching/true/selectFolder/INBOX/resultContext/searchResultsTab5 or (2) mailId[] parameter to index.php/mail/mail/movetofolder/fromFolder/INBOX/toFolder/INBOX.Trash. NOTE: the view attachment message process vector is already covered by CVE-2013-2585.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Phlymail | =7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-6229 is classified as a high-severity vulnerability due to potential exploitation allowing remote code execution.
To fix CVE-2013-6229, upgrade your Atmail Webmail Server to a version that addresses this XSS vulnerability, ideally beyond 7.0.2.
CVE-2013-6229 can be exploited through cross-site scripting (XSS) attacks, allowing attackers to execute arbitrary scripts in a user's browser.
Atmail Webmail Server 7.0.2 is specifically affected by CVE-2013-6229.
If you cannot upgrade, implement web application firewalls and input validation to mitigate the risk of CVE-2013-6229.