ISMail: XSS vulnerability in error page

2006.12.08
Credit: ISecAuditors
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 6.8/10
Impact Subscore: 6.4/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: Partial
Integrity impact: Partial
Availability impact: Partial

============================================= INTERNET SECURITY AUDITORS ALERT 2006-010 - Original release date: September 28, 2006 - Last revised: December 1, 2006 - Discovered by: Vicente Aguilera Diaz - Severity: 3/5 ============================================= I. VULNERABILITY ------------------------- XSS vulnerability in error page of ISMail. II. BACKGROUND ------------------------- ISMail is a webmail system. Programmed in HTML and PHP, it is designed to work with any imap server. ISMail requires that PHP 4.2+, compiled with and IMAP and Session support, be installed on the server that runs it. You have a choice of data-store backends (xml, encrypted xml, mysql, and postgresql are included, each requiring their respective PHP modules), and miscellaneous other options that can make the Inside Systems Mail experience a little friendlier. Unlike most other webmail programs, Inside Systems Mail is both quick and easy to use. The layout, complete with address book and folder options, is simple and familiar to most users. For administrators, the data-stores and options are easily extensible so that Inside Systems Mail can be dropped in nearly any configuration with minimal extra coding. The product homepage is: http://www.insidesystems.net/projects/project.php?projectid=4 III. DESCRIPTION ------------------------- The error page "error.php" receives a parameter facilitated in the querystring that shows the error message. This parameter ("error") can be manipulated by an attacker to inject arbitrary script/HTML code. This is dangerous because it's possible to realize XSS's attacks to obtain the session cookies of authenticated users and to spoof his session, or deface the error page. IV. PROOF OF CONCEPT ------------------------- Example of XSS attack: http://<webserver>/<path_to_ismail>/error.php?error=XSS%20attack%3Cscrip t%3Ealert(document.cookie);%3C/script%3E V. BUSINESS IMPACT ------------------------- An attacker can spoof the session of other authenticated users allowing to access to his mail, or deface the error page. VI. SYSTEMS AFFECTED ------------------------- This vulnerability has been tested in the last version of ISMail (2.0, released on 2005-01-20) Possibly all versions are affected by this vulnerability. VII. SOLUTION ------------------------- Update version from the repository. VIII. REFERENCES ------------------------- http://www.insidesystems.net/projects/project.php?projectid=4 IX. CREDITS ------------------------- This vulnerability has been discovered and reported by Vicente Aguilera Diaz (vaguilera=at=isecauditors=dot=com). X. REVISION HISTORY ------------------------- September 28, 2006: Initial release. XI. DISCLOSURE TIMELINE ------------------------- September 27, 2006 Vulnerability acquired by Vicente Aguilera Diaz Internet Security Auditors (www.isecauditors.com) September 28, 2006 Initial vendor notification sent. October 1, 2006 The vendor fixed the vulnerability in the repository. XII. LEGAL NOTICES ------------------------- The information contained within this advisory is supplied "as-is" with no warranties or guarantees of fitness of use or otherwise. Internet Security Auditors, S.L. accepts no responsibility for any damage caused by the use or misuse of this information.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top