Outblaze Email IMG Tag XSS

2004-05-23T07:32:55
ID OSVDB:8104
Type osvdb
Reporter DarkBicho(darkbicho@gmail.com)
Modified 2004-05-23T07:32:55

Description

Vulnerability Description

Outblaze Web based e-mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate [IMG] tag variables upon submission of emails. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Technical Description

It is important to note that the vendor does not appear publicly list the product versions making it almost impossible to ensure which versions are in fact affected.

Solution Description

Currently, there are no known upgrades, patches, or workarounds available to correct this issue.

Short Description

Outblaze Web based e-mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate [IMG] tag variables upon submission of emails. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

References:

Vendor URL: http://www.outblaze.com/ Security Tracker: 1010735 Secunia Advisory ID:12084 Other Advisory URL: http://www.swp-zone.org/archivos/advisory-09.txt Other Advisory URL: http://www.securiteam.com/securitynews/5CP0O20DFI.html Mail List Post: http://archives.neohapsis.com/archives/fulldisclosure/2004-07/0733.html CVE-2004-2625 Bugtraq ID: 10756