# N/A
## 概述
Mitel MiContact Center Business(≤10.2.0.10)和 Mitel CX(≤1.1.0.1)的多媒体电子邮件组件中存在跨站脚本(XSS)漏洞,因输入验证不足,未认证攻击者可利用此漏洞实施攻击。
## 影响版本
- Mitel MiContact Center Business ≤ 10.2.0.10
- Mitel CX ≤ 1.1.0.1
## 细节
漏洞存在于多媒体电子邮件组件中,由于对用户输入缺乏充分验证,攻击者可注入恶意脚本。利用该漏洞需满足两个条件:邮件通道已启用,且用户需与恶意邮件进行交互。
## 影响
成功利用该漏洞可在受害者浏览器或桌面客户端中执行任意脚本,可能导致会话劫持、敏感信息泄露或恶意操作。
是否为 Web 类漏洞: 未知
判断理由:
| # | POC 描述 | 源链接 | 神龙链接 |
|---|
标题: Security Advisories -- 🔗来源链接
标签:
标题: Mitel Product Security Advisory MISA-2025-0010 | Mitel -- 🔗来源链接
标签:
神龙速读:
- **Advisory ID:** MISA-2025-0010
- Identifies the unique identifier for this security advisory.
- **Publish Date:** 2025-12-10
- Indicates when the advisory was first published.
- **Last Updated:** 2026-01-05
- Shows the most recent update to the advisory.
- **Revision:** 2.0
- Indicates the version of the advisory.
- **Summary:**
- A cross-site scripting (XSS) vulnerability in the Ignite Mail component of MiContact Center Business and Mitel CX allows an attacker to execute arbitrary scripts due to insufficient input validation.
- **Vulnerability Severity:**
- Rated as high, with specific CVE IDs and CVSS scores provided for MiContact Center Business and Mitel CX.
- **Affected Products and Solutions:**
- Lists the impacted products (MiContact Center Business and Mitel CX), versions affected, and the available solutions/hotfixes.
- **Solution/Recommended Action:**
- Recommends upgrading to specific versions and applying the provided hotfixes.
- **Related CVEs/CWEs/Advisories:**
- Links this advisory to related Common Vulnerabilities and Exposures.
- **Revision History:**
- Tracks changes to the advisory over time.
- **Publisher and Legal Disclaimer:**
- Information on the publisher, Mitel PSIRT, and legal terms regarding the advisory.
暂无评论