I. VULNERABILITY
-------------------------
Multiplus XSS in Proxmox Mail Gateway 3.1
II. BACKGROUND
-------------------------
Proxmox Mail Gateway helps you protect your business against all email
threats like spam, viruses, phishing and trojans at the moment they
emerge. The flexible architecture combined with the userfriendly,
III. DESCRIPTION
-------------------------
Has been detected a XSS Reflected via GET and Store XSS via POST
vulnerability in Promox Mail Gateway in
"/objects/who/index.htm?state=" parameter "state" and input User
(E-mail address) in /quarantine/spam/manage.htm that allows the
execution of arbitrary HTML/script code to be executed in the context
of the victim user's browser and/or Session Hijacking attack
IV. PROOF OF CONCEPT
-------------------------
The application does not validate the parameter filter in
https://IP/objects/who/index.htm?itemid=1&gid=2&state=
'>aaaaa<script>alert(document.cookie)</script>
V. BUSINESS IMPACT
-------------------------
That allows the execution attackers tohijack the authentication of
administrators.
VI. REQUIREMENTS
-----------------------
An Attacker needs to know the IP of the device.
An Administrator needs an authenticated connection to the device.
VII. SYSTEMS AFFECTED
-------------------------
Try Proxmox Mail Gateway 3.1
VIII. SOLUTION
-------------------------
All parameter must be validated.
Fix
http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component
By William Costa