IceWarp 12.2.0 / 12.1.x Cross Site Scripting

IceWarp versions 12.2.0 and 12.1.x suffer from a cross site scripting vulnerability.

MD5 | 6c27cdc2fb3e29acafb5a2445cb0a827

Advisory: IceWarp: Cross-Site Scripting in Notes

During a penetration test, RedTeam Pentesting discovered that the
IceWarp WebMail Server is prone to cross-site scripting attacks in notes
for objects. If attackers with access to the IceWarp system provide a
manipulated object that is displayed by users, they can run arbitrary
JavaScript code in the users' browsers.


Product: IceWarp WebMail Server
Affected Versions: IceWarp 12.2.0, 12.1.x, probably earlier as well
Fixed Versions: IceWarp
Vulnerability Type: Cross-Site Scripting
Security Risk: high
Vendor URL:
Vendor Status: patch available
Advisory URL:
Advisory Status: published
CVE: CVE-2019-19266


"Secure professional email with own domain and revolutionary integration
with chat. Shared calendars for perfect planning."
(from the vendor's homepage)

More Details

Users can create, modify and share appointments in IceWarp with other
users of the web application. Especially noteworthy are the following
two XML Entities in the request to create a new appointment:

<evnnote><h1;>RedTeam Pentesting</h1;></evnnote>

These define a note for an appointment. It was found that in notes some
HTML entities were rendered, but some entities and attributes were
filtered. However, the filter only takes effect when the content type of
the note is set to "text/html". When the content type is left out or set
to any other type, the filter is not active, enabling attackers to
circumvent the filter and execute JavaScript in the user's browser. The
same is true for notes attached to other objects, such as files or

Just using the calendar module, at least three ways to attack other
IceWarp users are available using cross-site scripting in a note of an

* Inviting other attendees to an appointment
* Sharing access to an appointment
* Sending a calendar file as a request via email

Especially for the first variant of attacking an IceWarp user by adding
that user to a manipulated appointment, no user interaction is required
from the attacked user besides opening the IceWarp calendar.

Proof of Concept

Create an appointment using an HTTP request similar to the following:

POST /[...]/webmail/server/webmail.php HTTP/1.1
Content-Type: text/xml

<iq sid="wm-XXXXXXXXXXXXXXXXXXXXXX" type="set">
<query xmlns="webmail:iq:items">
<account uid="[email protected]">
<folder uid="Calendar">
<item action="add">
<evntitle>Example Appointment</evntitle>
<evnnote><img style="display: none;" src="x" onerror="alert('RedTeam Pentesting')"></evnnote>


None known.


Update to IceWarp

Security Risk

Attackers with access to an IceWarp account could give other legitimate
IceWarp users access to manipulated objects. If the attacked user opens
the preview of such an object, for example by just opening the calendar,
a cross-site scripting vulnerability can be exploited. That could, for
example, be used to display a fake login form and get access to the
user's credentials, or to access any data stored in IceWarp such as
emails, contacts, tasks, files or appointments. While this requires an
attacker with access to an IceWarp account, this kind of access could be
gained by exploiting the vulnerability described in rt-sa-2019-15 [1].
This is considered to pose a high risk.


2019-11-11 Vulnerability identified
2019-11-15 Vendor notified
2019-11-22 Customer approved disclosure
2019-11-25 CVE number requested
2019-11-25 CVE number assigned
2019-12-02 Vendor released fixed version
2019-12-10 Customer approved disclosure
2019-12-13 Fixed version released
2020-01-02 Advisory released



RedTeam Pentesting GmbH

RedTeam Pentesting offers individual penetration tests performed by a
team of specialised IT-security experts. Hereby, security weaknesses in
company networks or products are uncovered and can be fixed immediately.

As there are only few experts in this field, RedTeam Pentesting wants to
share its knowledge and enhance the public knowledge with research in
security-related areas. The results are made available as public
security advisories.

More information about RedTeam Pentesting can be found at:

Working at RedTeam Pentesting

RedTeam Pentesting is looking for penetration testers to join our team
in Aachen, Germany. If you are interested please visit:

RedTeam Pentesting GmbH Tel.: +49 241 510081-0
Dennewartstr. 25-27 Fax : +49 241 510081-99
52068 Aachen
Germany Registergericht: Aachen HRB 14004
Geschäftsführer: Patrick Hof, Jens Liebchen

Related Posts