Korean
<< Back
VID 21553
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of IlohaMail which is older than 0.8.14-rc3 is detected as running on the host. IlohaMail is a webmail package written in PHP. IlohaMail versions 0.8.14-rc2 and earlier are vulnerable to a cross-site scripting vulnerability, caused by improper validation of the text, file name, and MIME media type when processing message attachments. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the IlohaMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=304525
http://secunia.com/advisories/14957/

* Platforms Affected:
Ryo Chijiiwa, IlohaMail versions 0.8.14-rc2 and earlier
Any operating system Any version
Recommendation Upgrade to the latest version of IlohaMail (0.8.14-RC3 or 0.9-200504152 or later), available from the IlohaMail Download Web page at http://sourceforge.net/projects/ilohamail/
Related URL CVE-2005-1120 (CVE)
Related URL 13175 (SecurityFocus)
Related URL 20095 (ISS)