When a user opens a file attachment in an email, the link is as follows:
http://<atmail-server>/index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<ID>/filenameOriginal/<file>
where:
- is the Atmail WebMail server
- is the unique ID for the message that contains the attachment
- is the attachment file in the message
A malicious user can inject arbitrary HTML/script code in the parameter. For example:
http://<atmail-server>/index.php/mail/viewmessage/getattachment/folder/INBOX/uniqueId/<ID>/filenameOriginal/test.txt<H1><marquee>This+is+an+XSS+example