RainLoop WebMail Vulnerability | General Hacking | Crax

Welcome To Crax.Pro Forum!

Check our new Marketplace at Crax.Shop

   Login! SignUp Now!
  • We are in solidarity with our brothers and sisters in Palestine. Free Palestine. To learn more visit this Page

  • Crax.Pro domain has been taken down!

    Alternatives: Craxpro.io | Craxpro.com

RainLoop WebMail Vulnerability

RainLoop WebMail Vulnerability

LV
0
 

jackaw

Member
Joined
Feb 9, 2024
Threads
5
Likes
2
Credits
348©
Cash
0$
An unpatched high-severity security flaw has been disclosed in the open-source RainLoop web-based email client that could be weaponized to siphon emails from victims’ inboxes.

Tracked as CVE-2022-29360, the flaw relates to a stored cross-site-scripting vulnerability impacting the latest version of RainLoop v1.16.0

Stored XSS flaws, also called persistent XSS, occur when a malicious script is injected directly into a target web application’s server by means of user input that’s permanently stored in a database and is later served to other users.

Impacting all RainLoop installations running under default configurations, attack chains leveraging the flaw could take the form of a specially crafted email sent to potential victims that, when viewed, executes a malicious JavaScript payload in the browser without requiring any user interaction.

RainLoop has been informed about the bug on November 30, 2021, and that the software maker has failed to issue a fix for more than four months.Its recommended to migrate to a RainLoop fork called SnappyMail, which is actively maintained and unaffected by the security issue.


 
  • Like
Reactions: fognayerku

Create an account or login to comment

You must be a member in order to leave a comment

Create account

Create an account on our community. It's easy!

Log in

Already have an account? Log in here.

Tips
Tips
Top Bottom