{"containers":{"cna":{"affected":[{"product":"MAIL2000","vendor":"Openfind","versions":[{"lessThan":"Before 20190919","status":"affected","version":"6.0","versionType":"custom"},{"lessThan":"SP4 Patch 076","status":"affected","version":"7.0","versionType":"custom"}]}],"credits":[{"lang":"en","value":"Tony Kuo (CHT Security), Vtim (CHT Security)"}],"datePublic":"2019-11-11T00:00:00.000Z","descriptions":[{"lang":"en","value":"The \"/cgi-bin/go\" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities."}],"problemTypes":[{"descriptions":[{"cweId":"CWE-79","description":"CWE-79 Cross-site Scripting (XSS)","lang":"en","type":"CWE"}]}],"providerMetadata":{"dateUpdated":"2019-11-22T15:19:49.000Z","orgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","shortName":"twcert"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"https://gist.github.com/tonykuo76/95638395e0c83e68dbd3db0fa0184e27"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.openfind.com.tw/taiwan/resource.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://gist.github.com/chtsecurity/21119b393640bea1d010ab9e3bee216d"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.chtsecurity.com/download/5011077112c76fb73f82d7eeb2b41b3bcd06c5037be242fec7b185603ca52dc1.txt"},{"tags":["x_refsource_CONFIRM"],"url":"https://www.twcert.org.tw/en/cp-128-3085-45bda-2.html"},{"tags":["x_refsource_CONFIRM"],"url":"https://tvn.twcert.org.tw/taiwanvn/TVN-201909001"},{"tags":["x_refsource_MISC"],"url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-004.pdf"},{"tags":["x_refsource_MISC"],"url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-005.pdf"}],"source":{"discovery":"EXTERNAL"},"title":"Openfind MAIL2000 Webmail Pre-Auth Cross-Site Scripting","x_generator":{"engine":"Vulnogram 0.0.9"},"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@cert.org.tw","DATE_PUBLIC":"2019-11-11T04:00:00.000Z","ID":"CVE-2019-15071","STATE":"PUBLIC","TITLE":"Openfind MAIL2000 Webmail Pre-Auth Cross-Site Scripting"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"MAIL2000","version":{"version_data":[{"version_affected":"<","version_name":"6.0","version_value":"Before 20190919"},{"version_affected":"<","version_name":"7.0","version_value":"SP4 Patch 076"}]}}]},"vendor_name":"Openfind"}]}},"credit":[{"lang":"eng","value":"Tony Kuo (CHT Security), Vtim (CHT Security)"}],"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"The \"/cgi-bin/go\" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities."}]},"generator":{"engine":"Vulnogram 0.0.9"},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"CWE-79 Cross-site Scripting (XSS)"}]}]},"references":{"reference_data":[{"name":"https://gist.github.com/tonykuo76/95638395e0c83e68dbd3db0fa0184e27","refsource":"CONFIRM","url":"https://gist.github.com/tonykuo76/95638395e0c83e68dbd3db0fa0184e27"},{"name":"https://www.openfind.com.tw/taiwan/resource.html","refsource":"CONFIRM","url":"https://www.openfind.com.tw/taiwan/resource.html"},{"name":"https://gist.github.com/chtsecurity/21119b393640bea1d010ab9e3bee216d","refsource":"CONFIRM","url":"https://gist.github.com/chtsecurity/21119b393640bea1d010ab9e3bee216d"},{"name":"https://www.chtsecurity.com/download/5011077112c76fb73f82d7eeb2b41b3bcd06c5037be242fec7b185603ca52dc1.txt","refsource":"CONFIRM","url":"https://www.chtsecurity.com/download/5011077112c76fb73f82d7eeb2b41b3bcd06c5037be242fec7b185603ca52dc1.txt"},{"name":"https://www.twcert.org.tw/en/cp-128-3085-45bda-2.html","refsource":"CONFIRM","url":"https://www.twcert.org.tw/en/cp-128-3085-45bda-2.html"},{"name":"https://tvn.twcert.org.tw/taiwanvn/TVN-201909001","refsource":"CONFIRM","url":"https://tvn.twcert.org.tw/taiwanvn/TVN-201909001"},{"name":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-004.pdf","refsource":"MISC","url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-004.pdf"},{"name":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-005.pdf","refsource":"MISC","url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-005.pdf"}]},"source":{"discovery":"EXTERNAL"}}},"adp":[{"providerMetadata":{"orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE","dateUpdated":"2024-08-05T00:34:53.173Z"},"title":"CVE Program Container","references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://gist.github.com/tonykuo76/95638395e0c83e68dbd3db0fa0184e27"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.openfind.com.tw/taiwan/resource.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://gist.github.com/chtsecurity/21119b393640bea1d010ab9e3bee216d"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.chtsecurity.com/download/5011077112c76fb73f82d7eeb2b41b3bcd06c5037be242fec7b185603ca52dc1.txt"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://www.twcert.org.tw/en/cp-128-3085-45bda-2.html"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://tvn.twcert.org.tw/taiwanvn/TVN-201909001"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-004.pdf"},{"tags":["x_refsource_MISC","x_transferred"],"url":"https://www.openfind.com.tw/taiwan/download/m2k/patch/Openfind_OF-ISAC-19-005.pdf"}]}]},"cveMetadata":{"assignerOrgId":"cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e","assignerShortName":"twcert","cveId":"CVE-2019-15071","datePublished":"2019-11-20T04:06:20.948Z","dateReserved":"2019-08-15T00:00:00.000Z","dateUpdated":"2024-09-17T00:10:30.678Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"}