First published: Thu Dec 31 2020(Updated: )
HGiga MailSherlock does not validate user parameters on multiple login pages. Attackers can use the vulnerability to inject JavaScript syntax for XSS attacks.
Credit: twcert@cert.org.tw
Affected Software | Affected Version | How to fix |
---|---|---|
Hgiga Msr45 Isherlock-antispam | <4.5-133 | |
Hgiga Msr45 Isherlock-user | <4.5-120 | |
Hgiga Ssr45 Isherlock-antispam | <4.5-133 | |
Hgiga Ssr45 Isherlock-user | <4.5-120 |
Update MailSherlock MSR45/SSR45 Module to: iSherlock-user-4.5-120.i386.rpm iSherlock-antispam-4.5-133.i386.rpm
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-35741 is classified as a high severity vulnerability due to the potential for cross-site scripting (XSS) attacks.
To fix CVE-2020-35741, ensure that input validation is implemented on all user input parameters within the affected software.
CVE-2020-35741 affects Hgiga Msr45 Isherlock-antispam versions up to 4.5-133 and Msr45 Isherlock-user versions up to 4.5-120, as well as Ssr45 equivalents.
Yes, CVE-2020-35741 can be exploited remotely if an attacker can access the affected login pages.
CVE-2020-35741 allows attackers to perform cross-site scripting (XSS) attacks by injecting malicious JavaScript.