An issue was discovered in MDaemon before 20.0.4. There is Reflected XSS in Webmail (aka WorldClient). It can be exploited via a GET request. It allows performing any action with the privileges of the attacked user.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
https://www.altn.com/Support/SecurityUpdate/MD011221_MDaemon_EN/ | patch vendor advisory |
https://github.com/chudyPB/MDaemon-Advisories | third party advisory exploit |