First published: Wed Nov 20 2019(Updated: )
The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Openfind Mail2000 | >=6.0<=7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-15072 is a cross-site scripting (XSS) vulnerability in the login feature of MAIL2000 versions 6.0 and 7.0, allowing execution of arbitrary code via any parameter.
The severity of CVE-2019-15072 is medium with a CVSS score of 6.1.
CVE-2019-15072 affects the login feature in MAIL2000 versions 6.0 and 7.0, potentially allowing the execution of arbitrary code.
To fix CVE-2019-15072, it is recommended to upgrade MAIL2000 to a version that has patched the vulnerability.
Yes, here are some references for CVE-2019-15072: - [GitHub Gist 1](https://gist.github.com/chtsecurity/b3396500d4686ad47fb26f64967ef24a) - [GitHub Gist 2](https://gist.github.com/tonykuo76/5bf1ac369d953d5276afe0a2d04c2147) - [TW-CERT Advisory](https://tvn.twcert.org.tw/taiwanvn/TVN-201909002)