Axigen's WebMail Ajax interface implements a view attachment function that executes the javascript code which is included in email HTML attachments.
This allows a malicious user to craft email messages that could expose an Axigen Ajax WebMail user to cross site scripting or other attacks that rely on arbitrary javascript code running within a trusted domain.
Axigen versions starting with 9.0 address this issue by limiting the attachment types for which the in-browser preview is available.
For Axigen 8.x versions, we strongly recommend you to download & apply the patch below.
This allows a malicious user to craft email messages that could expose an Axigen Ajax WebMail user to cross site scripting or other attacks that rely on arbitrary javascript code running within a trusted domain.
Axigen versions starting with 9.0 address this issue by limiting the attachment types for which the in-browser preview is available.
For Axigen 8.x versions, we strongly recommend you to download & apply the patch below.
Solution
Axigen v8.0 (without IM)
Download PatchAxigen v8.0 (with IM)
Download PatchAxigen v8.x (without IM)
Download PatchAxigen v8.x (with IM)
Download PatchVulnerability test
Patch Installation
OS:
LinuxWindows