| VID |
21475 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The Open WebMail is vulnerable to a cross-site scripting vulnerability in the logindomain parameter. Open WebMail is an open-source Web mail system based on the Neomail version 1.14 from Ernie Miller, written in Perl for Unix-based operating systems. Open WebMail versions prior to 2.50 20050212 are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input in the logindomain parameter. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* References: http://www.openwebmail.org/openwebmail/download/cert/advisories/SA-04:01.txt http://securitytracker.com/alerts/2005/Feb/1013172.html http://secunia.com/advisories/14253/ http://www.osvdb.org/13788
* Platforms Affected: Open WebMail Project, Open WebMail versions prior to 2.50 20050212 Linux Any version Unix Any version |
| Recommendation |
Upgrade to the latest version of Open WebMail (current-2.50 dated 12-Feb-2005 or later), available from the Open WebMail Download Web site at http://openwebmail.org/openwebmail/download/current/ |
| Related URL |
CVE-2005-0445 (CVE) |
| Related URL |
12547 (SecurityFocus) |
| Related URL |
19335 (ISS) |
|