First published: Wed Jan 16 2019(Updated: )
SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SmarterTools SmarterMail | <13.3.5535 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2015-9276 is medium with a CVSS score of 6.1.
CVE-2015-9276 allows an attacker to run malicious JavaScript code when a user opens or replies to an email, which can lead to password resets and other security compromises.
Yes, SmarterTools SmarterMail versions before 13.3.5535 are affected by CVE-2015-9276.
To mitigate the impact of CVE-2015-9276, it is recommended to update SmarterMail to version 13.3.5535 or later.
More information about CVE-2015-9276 can be found in the following references: [Link 1](https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf), [Link 2](https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails/), [Link 3](https://www.smartertools.com/smartermail/release-notes/13).