Outblaze Cross Site Scripting Vulnerability

2006.02.05
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

Title: outblaze Cross Site Scripting Author: Simo Ben youssef aka _6mO_HaCk <simo_at_morx_org> Discovered: 23 january 2005 Published: 02 february 2006 MorX Security Research Team http://www.morx.org Original advisory: http://www.morx.org/outblazeXSS.txt Service: Webmail manager Vendor: outblaze / www.outblaze.com Vulnerability: Cross Site Scripting / Cookie-Theft / Relogin attacks Severity: Medium/High Details: With over 40 million mailboxes under Outblaze management, Outblaze provided enhanced messaging services to telcos, service providers, VARs, Carriers and Corporations on an outsoucing basis, The core product is an advanced email system with several available ancillary services. throw.main outblaze script is prone to cross-site scripting attacks. This problem is due to a failure in the application to properly sanitize user-supplied input. input can be passed in variable $file Impact: an attacker can exploit the vulnerable scripts to have arbitrary script code executed in the browser of an authentified outblaze user in the context of the vulnerable website. resulting in the theft of cookie-based authentication giving the attacker full access to the victim's email account as well as other type of attacks. Examples: http://www.vulnerable-site.com/scripts/common/throw.main?file=<BODY%20ON LOAD=alert('vul')> screen capture: http://www.morx.org/mailXSS.jpg Disclaimer: this entire document is for eductional, testing and demonstrating purpose only. Modification use and/or publishing this information is entirely on your OWN risk. The information provided in this advisory is to be used/tested on your OWN machine/Account. I cannot be held responsible for any of the above.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2017, cxsecurity.com

 

Back to Top