漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
Vulnerability Title
mailcow: dockerized vulnerable to stored XSS in Quarantine attachment filenames
Vulnerability Description
mailcow: dockerized is an open source groupware/email suite based on docker. In versions prior to 2026-03b, the Quarantine details modal injects attachment filenames into HTML without escaping, allowing arbitrary HTML/JS execution. An attacker can deliver an email with a crafted attachment name so that when an admin views the quarantine item, JavaScript executes in their browser, taking over their account. Version 2026-03b fixes the vulnerability.
CVSS Information
N/A
Vulnerability Type
在Web页面生成时对输入的转义处理不恰当(跨站脚本)
Vulnerability Title
mailcow: dockerized 跨站脚本漏洞
Vulnerability Description
mailcow: dockerized是mailcow开源的一个docker化的mailcow应用软件。 mailcow: dockerized 2026-03b之前版本存在跨站脚本漏洞,该漏洞源于隔离详情模态框未对附件文件名进行转义,可能导致任意HTML/JavaScript执行并接管账户。
CVSS Information
N/A
Vulnerability Type
N/A