View Issue Details
| ID | Project | Category | View Status | Date Submitted | Last Update |
|---|---|---|---|---|---|
| 0002368 | SOGo | Web Mail | public | 2013-07-15 13:17 | 2013-07-16 15:33 |
| Reporter | ispoljaric | Assigned To | |||
| Priority | normal | Severity | major | Reproducibility | always |
| Status | closed | Resolution | fixed | ||
| Product Version | 2.0.6 | ||||
| Fixed in Version | 2.0.7 | ||||
| Summary | 0002368: Persistant XSS in sender field. | ||||
| Description | If the evil guy sends an email with From header with following code(1), the web interface will render both the image and execute DOM event (tested with onload and onmouseover). 1)"<IMG onmouseover="alert('foo');" SRC=http://i.imgur.com/Spxb03S.jpg>" | ||||
| Steps To Reproduce | Im using thunderbird, but it could be done manually, scripted or with another email client. Steps to reproduce with thunderbird: 1) Change the from header to the malicious code with Edit->Account Settings-> Your Name and enter : | ||||
| Additional Information | Screenshot provided in attachment. | ||||
| Tags | No tags attached. | ||||
| Date Modified | Username | Field | Change |
|---|---|---|---|
| 2013-07-15 13:17 | ispoljaric | New Issue | |
| 2013-07-15 13:17 | ispoljaric | File Added: sogo_xss_test.png | |
| 2013-07-16 15:33 | ludovic | Note Added: 0005750 | |
| 2013-07-16 15:33 | ludovic | Status | new => closed |
| 2013-07-16 15:33 | ludovic | Resolution | open => fixed |
| 2013-07-16 15:33 | ludovic | Fixed in Version | => 2.0.7 |