Cross-site Scripting (XSS) - Reflected in mailcow/mailcow-dockerized

Valid

Reported on

Sep 7th 2021


✍️ Description

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

The user input GET parameter Protocol of autodiscover-json.php is unsanitized resulting reflected cross site scripting.

Remediation

Apply context-dependent encoding and/or validation to user input rendered on a page

References

We created a GitHub Issue asking the maintainers to create a SECURITY.md 3 months ago
Ziding Zhang
3 months ago

Admin


Hey wtwver, I've just emailed the repo's maintainers for you.

We have contacted a member of the mailcow/mailcow-dockerized team and are waiting to hear back 3 months ago
3 months ago

Maintainer


Thank you guys :)

3 months ago

Maintainer


I'm just a bit lost about how to use that for an attack. Yes, it should be sanitized, but it is in a JSON response. Can you give me an example?

mailcow/mailcow-dockerized maintainer confirmed that a fix has been merged on 8e736b 3 months ago
The fix bounty has been dropped