First published: Thu Jun 05 2014(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in the web client interface in Ipswitch IMail Server 12.3 and 12.4, possibly before 12.4.1.15, allow remote attackers to inject arbitrary web script or HTML via (1) the Name field in an add new contact action in the Contacts section or unspecified vectors in (2) an Add Group task in the Contacts section, (3) an add new event action in the Calendar section, or (4) the Task section.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Ipswitch IMail Secure Server | =12.3 | |
Ipswitch IMail Secure Server | =12.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-3878 is classified as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2014-3878, upgrade to Ipswitch IMail Server version 12.4.1.15 or later.
CVE-2014-3878 affects Ipswitch IMail Server versions 12.3 and 12.4.
CVE-2014-3878 is a cross-site scripting (XSS) vulnerability that allows attackers to inject arbitrary web scripts.
Yes, CVE-2014-3878 can allow attackers to execute malicious scripts that could compromise user data.