AeroMail message.php Subject XSS

2002-03-22T00:00:00
ID OSVDB:6435
Type osvdb
Reporter Ulf Harnhammar(ulfh@update.uu.se)
Modified 2002-03-22T00:00:00

Description

Vulnerability Description

AeroMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input in the 'Subject' fields upon submission to the 'message.php' script. This could allow a remote attacker to compose a specially crafted email message containing arbitrary JavaScript code in the Subject header, which would execute in the recipient's Web browser once the message is received resulting in a loss of integrity.

Solution Description

Upgrade to version 1.45 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

AeroMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate user-supplied input in the 'Subject' fields upon submission to the 'message.php' script. This could allow a remote attacker to compose a specially crafted email message containing arbitrary JavaScript code in the Subject header, which would execute in the recipient's Web browser once the message is received resulting in a loss of integrity.

References:

Vendor URL: http://cushman.net/projects/aeromail/ Security Tracker: 1003722 Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2002-03/0004.html ISS X-Force ID: 8346 CVE-2002-0411 Bugtraq ID: 4215