Ability Mail Server errormsg Parameter XSS

2004-07-11T00:00:00
ID OSVDB:7718
Type osvdb
Reporter Dr_insane(dr_insane@pathfinder.gr)
Modified 2004-07-11T00:00:00

Description

Vulnerability Description

Ability Mail Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'errormsg' parameter upon submission to the '_error' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 2.10 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Ability Mail Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate 'errormsg' parameter upon submission to the '_error' page. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]:8000/_error?id=[id]&errormsg=[exploit_code] http://[victim]:8000/_error?id=[id]&errormsg=<script>alert(document.cookie)</script>

References:

Vendor URL: http://www.code-crafters.com/abilitymailserver/ Security Tracker: 1010672 Secunia Advisory ID:12039 Related OSVDB ID: 7719 Other Advisory URL: http://members.lycos.co.uk/r34ct/main/Ability_mail_server_1.18.txt ISS X-Force ID: 16676 Bugtraq ID: 10695