Winmail Server Webmail Web Administration User Information XSS

2005-01-27T04:53:54
ID OSVDB:13246
Type osvdb
Reporter Tan Chew Keong(chewkeong@security.org.sg)
Modified 2005-01-27T04:53:54

Description

Vulnerability Description

Winmail Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input in certain fields upon submission to the 'user.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 4.0 (Build 1318) or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Winmail Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input in certain fields upon submission to the 'user.php' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Security Tracker: 1013017 Secunia Advisory ID:14053 Related OSVDB ID: 13248 Related OSVDB ID: 13244 Related OSVDB ID: 13247 Related OSVDB ID: 13245 Other Advisory URL: http://www.security.org.sg/vuln/magicwinmail40.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2005-01/0306.html CVE-2005-0314 Bugtraq ID: 12388