SmarterTools SmarterMail before 13.3.5535 was vulnerable to stored XSS by bypassing the anti-XSS mechanisms. It was possible to run JavaScript code when a victim user opens or replies to the attacker's email, which contained a malicious payload. Therefore, users' passwords could be reset by using an XSS attack, as the password reset page did not need the current password.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 02:40
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.nccgroup.trust/globalassets/our-research/uk/technical-advisories/2015/technical-advisory-smartermail-stored-xss-in-emails-v2.pdf - Third Party Advisory | |
| References | () https://www.nccgroup.trust/uk/our-research/smartermail-stored-xss-in-emails/ - Third Party Advisory | |
| References | () https://www.smartertools.com/smartermail/release-notes/13 - Release Notes | 
Information
                Published : 2019-01-16 16:29
Updated : 2024-11-21 02:40
NVD link : CVE-2015-9276
Mitre link : CVE-2015-9276
CVE.ORG link : CVE-2015-9276
JSON object : View
Products Affected
                smartertools
- smartermail
CWE
                
                    
                        
                        CWE-79
                        
            Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
