Vulnerability Details : CVE-2020-18723
Stored cross-site scripting (XSS) in file attachment field in MDaemon webmail 19.5.5 allows an attacker to execute code on the email recipient side while forwarding an email to perform potentially malicious activities.
Vulnerability category: Cross site scripting (XSS)Execute code
Exploit prediction scoring system (EPSS) score for CVE-2020-18723
Probability of exploitation activity in the next 30 days: 0.36%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 69 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2020-18723
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
3.5
|
LOW | AV:N/AC:M/Au:S/C:N/I:P/A:N |
6.8
|
2.9
|
NIST |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST |
CWE ids for CVE-2020-18723
-
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.Assigned by: nvd@nist.gov (Primary)
References for CVE-2020-18723
-
https://www.altn.com/Support/SecurityUpdate/MD082520_MDaemon_EN/
MDaemon Patch Bulletin – MD082520Vendor Advisory
-
http://packetstormsecurity.com/files/161332/Alt-N-MDaemon-Webmail-20.0.0-Cross-Site-Scripting.html
Alt-N MDaemon Webmail 20.0.0 Cross Site Scripting ≈ Packet StormExploit;Third Party Advisory;VDB Entry
-
http://kailashbohara.com.np/blog/2020/07/15/mdaemon-stored-xss
Stored Cross Site Scripting on Mdaemon Webmail (20.0.0) – KailashExploit;Third Party Advisory
Products affected by CVE-2020-18723
- cpe:2.3:a:altn:mdaemon_webmail:*:*:*:*:*:*:*:*