Vulnerability Description
CommuniGate Pro 6.2 allows stored XSS via a message body in Pronto! Mail Composer, which is mishandled in /MIME/INBOX-MM-1/ if the raw email link (in .txt format) is modified and then renamed with a .html or .wssp extension.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Communigate | Communigate Pro | 6.2 |
Related Weaknesses (CWE)
References
- http://packetstormsecurity.com/files/149916/CommuniGatePro-Pronto-Webmail-6.2-CrThird Party AdvisoryVDB Entry
- https://drive.google.com/drive/folders/1irWaVi-AySHFFMap5pF1_7hk6mTeemDTExploitThird Party Advisory
- http://packetstormsecurity.com/files/149916/CommuniGatePro-Pronto-Webmail-6.2-CrThird Party AdvisoryVDB Entry
- https://drive.google.com/drive/folders/1irWaVi-AySHFFMap5pF1_7hk6mTeemDTExploitThird Party Advisory
FAQ
What is CVE-2018-18621?
CVE-2018-18621 is a vulnerability with a CVSS score of 6.1 (MEDIUM). CommuniGate Pro 6.2 allows stored XSS via a message body in Pronto! Mail Composer, which is mishandled in /MIME/INBOX-MM-1/ if the raw email link (in .txt format) is modified and then renamed with a ....
How severe is CVE-2018-18621?
CVE-2018-18621 has been rated MEDIUM with a CVSS base score of 6.1/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-18621?
Check the references section above for vendor advisories and patch information. Affected products include: Communigate Communigate Pro.