CommuniMail mailadmin.cgi list_id Variable XSS

2006-04-19T03:02:37
ID OSVDB:24735
Type osvdb
Reporter r0t(krustevs@googlemail.com)
Modified 2006-04-19T03:02:37

Description

Vulnerability Description

CommuniMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'list_id' variable upon submission to the 'mailadmin.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

CommuniMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'list_id' variable upon submission to the 'mailadmin.cgi' script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

/cgi-bin/communimail/mailadmin.cgi?saction=show_contacts&list_id=[XSS]

References:

Vendor URL: http://www.sibsoft.net/communimail.html Secunia Advisory ID:19667 Related OSVDB ID: 24736 Other Advisory URL: http://pridels.blogspot.com/2006/04/communimail-xss-vuln.html ISS X-Force ID: 25931 CVE-2006-1944 Bugtraq ID: 17602