Korean
<< Back
VID 21340
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The BasiliX Webmail installed on the Web server, according to its version number, has a Subject and Message Cross-Site Scripting Vulnerability.
BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. BasiliX Webmail versions 1.1.0 and earlier are vulnerable to Cross-site Scripting vulnerability, caused by a failure of the application to properly filter script codes in the Subject or message field. By creating a specially crafted E-Mail containing malicious code in 'Subject' and 'message' field and persuading the target user to view it, a remote attacker could cause the code to be executed in the target's Web browser, once the message is viewed. An attacker could use this vulnerability to steal the target's cookie-based authentication credentials.

* Note: This check solely relied on the version number of the remote BasiliX Web mail to assess this vulnerability, so this might be a false positive.

* References:
http://archives.neohapsis.com/archives/bugtraq/2002-06/0232.html

* Platforms Affected:
Murat Arslan, BasiliX Webmail 1.1.0 and earlier
Unix Any version
Linux Any version
Microsoft Windows Any version
Recommendation Upgrade to the latest version (1.1.1 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/
Related URL CVE-2002-1708 (CVE)
Related URL 5060 (SecurityFocus)
Related URL 9384 (ISS)