Vulnerability Information
Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.
Vulnerability Title
Postal has HTML injection / XSS in message view
Vulnerability Description
Postal is an open source SMTP server. Postal versions less than 3.3.5 had a HTML injection vulnerability that allowed unescaped data to be included in the admin interface. The primary way for unescaped data to be added is via the API's "send/raw" method. This could allow arbitrary HTML to be injected in to the page which may modify the page in a misleading way or allow for unauthorised javascript to be executed. Fixed in 3.3.5 and higher.
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
Postal 跨站脚本漏洞
Vulnerability Description
Postal是Postal开源的一个完整且功能齐全的邮件服务器。供网站和 Web 服务器使用。 Postal 3.3.5之前版本存在跨站脚本漏洞,该漏洞源于API的send/raw方法允许包含未转义数据,可能导致HTML注入攻击。
CVSS Information
N/A
Vulnerability Type
N/A