| VID |
21343 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The BasiliX Webmail installed on the Web server, according to its version number, has a Content-Type Header Cross-Site Scripting Vulnerability. BasiliX is a PHP and Internet Messaging Access Protocol (IMAP) based Web mail program that uses the MySQL database server. BasiliX Webmail 1.1.1 and earlier are vulnerable to a Cross-Site Scripting Vulnerability, caused by a failure of the application to properly sanitize user-supplied E-Mail header strings. By creating a specially crafted E-Mail containing malicious code in 'Content-Type' header lines and persuading the target user to view it, a remote attacker could cause the code to be executed in the target's Web browser, once the message is viewed. An attacker could use this vulnerability to steal the target's cookie-based authentication credentials.
* Note: This check solely relied on the version number of the remote BasiliX Web mail to assess this vulnerability, so this might be a false positive.
* References: http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-2.txt http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt
* Platforms Affected: Murat Arslan, BasiliX Webmail 1.1.1 and earlier Unix Any version Linux Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the latest version (1.1.1 fix1 or later) of BasiliX Webmail, available from the BasiliX web site at http://sourceforge.net/projects/basilix/ |
| Related URL |
CVE-2002-1710 (CVE) |
| Related URL |
5062 (SecurityFocus) |
| Related URL |
9386 (ISS) |
|