Cross-site Scripting (XSS) - Reflected in mailcow/mailcow-dockerized

Valid

Reported on

Sep 7th 2021


✍️ Description

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

The user input GET parameter Protocol of autodiscover-json.php is unsanitized resulting reflected cross site scripting.

Remediation

Apply context-dependent encoding and/or validation to user input rendered on a page

References

We created a GitHub Issue asking the maintainers to create a SECURITY.md 2 years ago
Z-Old
2 years ago

Hey wtwver, I've just emailed the repo's maintainers for you.

We have contacted a member of the mailcow/mailcow-dockerized team and are waiting to hear back 2 years ago
2 years ago

Maintainer


Thank you guys :)

2 years ago

Maintainer


I'm just a bit lost about how to use that for an attack. Yes, it should be sanitized, but it is in a JSON response. Can you give me an example?

mailcow/mailcow-dockerized maintainer marked this as fixed with commit 8e736b 2 years ago
The fix bounty has been dropped
to join this conversation