Proxmox Mail Gateway 3.1 Cross Site Scripting

2014.03.13
Credit: William Costa
Risk: Low
Local: No
Remote: Yes
CVE: N/A
CWE: CWE-79

I. VULNERABILITY ------------------------- Multiplus XSS in Proxmox Mail Gateway 3.1 II. BACKGROUND ------------------------- Proxmox Mail Gateway helps you protect your business against all email threats like spam, viruses, phishing and trojans at the moment they emerge. The flexible architecture combined with the userfriendly, III. DESCRIPTION ------------------------- Has been detected a XSS Reflected via GET and Store XSS via POST vulnerability in Promox Mail Gateway in "/objects/who/index.htm?state=" parameter "state" and input User (E-mail address) in /quarantine/spam/manage.htm that allows the execution of arbitrary HTML/script code to be executed in the context of the victim user's browser and/or Session Hijacking attack IV. PROOF OF CONCEPT ------------------------- The application does not validate the parameter filter in https://IP/objects/who/index.htm?itemid=1&gid=2&state= '>aaaaa<script>alert(document.cookie)</script> V. BUSINESS IMPACT ------------------------- That allows the execution attackers tohijack the authentication of administrators. VI. REQUIREMENTS ----------------------- An Attacker needs to know the IP of the device. An Administrator needs an authenticated connection to the device. VII. SYSTEMS AFFECTED ------------------------- Try Proxmox Mail Gateway 3.1 VIII. SOLUTION ------------------------- All parameter must be validated. Fix http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component By William Costa


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top