Show plain JSON{"containers": {"cna": {"affected": [{"product": "MAIL2000", "vendor": "Openfind", "versions": [{"lessThan": "Before 20190919", "status": "affected", "version": "6.0", "versionType": "custom"}, {"lessThan": "SP4 Patch 076", "status": "affected", "version": "7.0", "versionType": "custom"}]}], "credits": [{"lang": "en", "value": "Tony Kuo (CHT Security), Vtim (CHT Security)"}], "datePublic": "2019-11-11T00:00:00", "descriptions": [{"lang": "en", "value": "The login feature in \"/cgi-bin/portal\" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities."}], "problemTypes": [{"descriptions": [{"cweId": "CWE-79", "description": "CWE-79 Cross-site Scripting (XSS)", "lang": "en", "type": "CWE"}]}], "providerMetadata": {"dateUpdated": "2019-11-20T04:16:18", "orgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "shortName": "twcert"}, "references": [{"tags": ["x_refsource_CONFIRM"], "url": "https://www.openfind.com.tw/taiwan/resource.html"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://gist.github.com/chtsecurity/b3396500d4686ad47fb26f64967ef24a"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://gist.github.com/tonykuo76/5bf1ac369d953d5276afe0a2d04c2147"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://www.chtsecurity.com/download/0837ce00c27c73dd3ba3a0d4a7df3a41aaea1ac1e9831a5d61bb64ed484a3598.txt"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201909002"}, {"tags": ["x_refsource_CONFIRM"], "url": "https://www.twcert.org.tw/en/cp-128-3086-ff35d-2.html"}], "source": {"discovery": "EXTERNAL"}, "title": "Openfind MAIL2000 Webmail Post-Auth Cross-Site Scripting", "x_generator": {"engine": "Vulnogram 0.0.9"}, "x_legacyV4Record": {"CVE_data_meta": {"ASSIGNER": "cve@cert.org.tw", "DATE_PUBLIC": "2019-11-11T04:00:00.000Z", "ID": "CVE-2019-15072", "STATE": "PUBLIC", "TITLE": "Openfind MAIL2000 Webmail Post-Auth Cross-Site Scripting"}, "affects": {"vendor": {"vendor_data": [{"product": {"product_data": [{"product_name": "MAIL2000", "version": {"version_data": [{"version_affected": "<", "version_name": "6.0", "version_value": "Before 20190919"}, {"version_affected": "<", "version_name": "7.0", "version_value": "SP4 Patch 076"}]}}]}, "vendor_name": "Openfind"}]}}, "credit": [{"lang": "eng", "value": "Tony Kuo (CHT Security), Vtim (CHT Security)"}], "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": {"description_data": [{"lang": "eng", "value": "The login feature in \"/cgi-bin/portal\" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities."}]}, "generator": {"engine": "Vulnogram 0.0.9"}, "problemtype": {"problemtype_data": [{"description": [{"lang": "eng", "value": "CWE-79 Cross-site Scripting (XSS)"}]}]}, "references": {"reference_data": [{"name": "https://www.openfind.com.tw/taiwan/resource.html", "refsource": "CONFIRM", "url": "https://www.openfind.com.tw/taiwan/resource.html"}, {"name": "https://gist.github.com/chtsecurity/b3396500d4686ad47fb26f64967ef24a", "refsource": "CONFIRM", "url": "https://gist.github.com/chtsecurity/b3396500d4686ad47fb26f64967ef24a"}, {"name": "https://gist.github.com/tonykuo76/5bf1ac369d953d5276afe0a2d04c2147", "refsource": "CONFIRM", "url": "https://gist.github.com/tonykuo76/5bf1ac369d953d5276afe0a2d04c2147"}, {"name": "https://www.chtsecurity.com/download/0837ce00c27c73dd3ba3a0d4a7df3a41aaea1ac1e9831a5d61bb64ed484a3598.txt", "refsource": "CONFIRM", "url": "https://www.chtsecurity.com/download/0837ce00c27c73dd3ba3a0d4a7df3a41aaea1ac1e9831a5d61bb64ed484a3598.txt"}, {"name": "https://tvn.twcert.org.tw/taiwanvn/TVN-201909002", "refsource": "CONFIRM", "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201909002"}, {"name": "https://www.twcert.org.tw/en/cp-128-3086-ff35d-2.html", "refsource": "CONFIRM", "url": "https://www.twcert.org.tw/en/cp-128-3086-ff35d-2.html"}]}, "source": {"discovery": "EXTERNAL"}}}, "adp": [{"providerMetadata": {"orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE", "dateUpdated": "2024-08-05T00:34:53.157Z"}, "title": "CVE Program Container", "references": [{"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.openfind.com.tw/taiwan/resource.html"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://gist.github.com/chtsecurity/b3396500d4686ad47fb26f64967ef24a"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://gist.github.com/tonykuo76/5bf1ac369d953d5276afe0a2d04c2147"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.chtsecurity.com/download/0837ce00c27c73dd3ba3a0d4a7df3a41aaea1ac1e9831a5d61bb64ed484a3598.txt"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://tvn.twcert.org.tw/taiwanvn/TVN-201909002"}, {"tags": ["x_refsource_CONFIRM", "x_transferred"], "url": "https://www.twcert.org.tw/en/cp-128-3086-ff35d-2.html"}]}]}, "cveMetadata": {"assignerOrgId": "cded6c7f-6ce5-4948-8f87-aa7a3bbb6b0e", "assignerShortName": "twcert", "cveId": "CVE-2019-15072", "datePublished": "2019-11-20T04:16:18.705244Z", "dateReserved": "2019-08-15T00:00:00", "dateUpdated": "2024-09-17T01:37:01.538Z", "state": "PUBLISHED"}, "dataType": "CVE_RECORD", "dataVersion": "5.1"}