A reflected Cross-Site Scripting (XSS) vulnerability in MindPalette NateMail 3.0.15 allows an attacker to execute remote JavaScript in a victim's browser via a specially crafted POST request. The application will reflect the recipient value if it is not in the NateMail recipient array. Note that this array is keyed via integers by default, so any string input will be invalid.
References
Link | Resource |
---|---|
https://mindpalette.com/tag/natemail/ | Product |
https://twitter.com/mindpalette | Not Applicable |
https://www.doyler.net/security-not-included/natemail-vulnerabilities | Exploit Third Party Advisory |
https://mindpalette.com/tag/natemail/ | Product |
https://twitter.com/mindpalette | Not Applicable |
https://www.doyler.net/security-not-included/natemail-vulnerabilities | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 04:24
Type | Values Removed | Values Added |
---|---|---|
References | () https://mindpalette.com/tag/natemail/ - Product | |
References | () https://twitter.com/mindpalette - Not Applicable | |
References | () https://www.doyler.net/security-not-included/natemail-vulnerabilities - Exploit, Third Party Advisory |
Information
Published : 2019-10-16 00:15
Updated : 2024-11-21 04:24
NVD link : CVE-2019-13392
Mitre link : CVE-2019-13392
CVE.ORG link : CVE-2019-13392
JSON object : View
Products Affected
mindpalette
- natemail
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')