[+]################################################################################################### [+] Title: MailZu 0.8RC3 - Reflected Cross Site Scripting [+] Credits / Discovery: Nassim Asrir [+] Author Email: wassline@gmail.com [+] Author Company: Henceforth [+]################################################################################################### Vendor: =============== https://sourceforge.net/ Product: =============== 0.8RC3 Download: =========== https://sourceforge.net/projects/mailzu/files/mailzu/ MailZu is a simple and intuitive web interface to manage Amavisd-new quarantine. Users can view their own quarantine, release/delete messages or request the release of messages. Vulnerability Type: ====================================== Reflected Cross Site Scripting. CVE Reference: =============== N/A Tested on: =============== Windows 7 Apache/2.4.23 (Win64) Exploit/POC: ============ 1) navigate the server http://server/index.php 2) inject the XSS Payload : http://server/index.php/"> 3) Done! Network Access: =============== Remote Impact: ================= Execute malicious scripts Severity: =========== High Disclosure Timeline: ===================== January 18, 2017 : Public Disclosure