Cross-site Scripting (XSS) - Reflected in mailcow/mailcow-dockerized

Valid

Reported on

Sep 7th 2021


✍️ Description

Cross-site Scripting (XSS) refers to client-side code injection attack wherein an attacker can execute malicious scripts into a legitimate website or web application. XSS occurs when a web application makes use of unvalidated or unencoded user input within the output it generates.

The user input GET parameter Protocol of autodiscover-json.php is unsanitized resulting reflected cross site scripting.

Remediation

Apply context-dependent encoding and/or validation to user input rendered on a page

References

We created a GitHub Issue asking the maintainers to create a SECURITY.md a year ago
Z-Old
a year ago

Admin


Hey wtwver, I've just emailed the repo's maintainers for you.

We have contacted a member of the mailcow/mailcow-dockerized team and are waiting to hear back a year ago
a year ago

Thank you guys :)

a year ago

I'm just a bit lost about how to use that for an attack. Yes, it should be sanitized, but it is in a JSON response. Can you give me an example?

mailcow/mailcow-dockerized maintainer confirmed that a fix has been merged on 8e736b a year ago
The fix bounty has been dropped
to join this conversation