VID |
21678 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of Mailreader which is older than version 2.3.36 is detected as installed on the host. Mailreader, developed by Kim Holviala, is a freely available Web-based POP3 Webmail written in Perl. Mailreader version 2.3.36 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input when displaying messages of the MIME type enriched/richtext. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version of Mailreader on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/14777 http://archives.neohapsis.com/archives/fulldisclosure/2005-03/0852.html
* Platforms Affected: Mailreader version 2.3.36 and earlier versions Linux Any version |
Recommendation |
Upgrade to the latest version of Mailreader (2.3.36 or later), available from the Mailreader.com Web site at http://www.mailreader.com/
For Debian GNU/Linux 3.0 (woody): Upgrade to the latest version of mailreader (2.3.29-5woody2 or later), as listed in Debian Security Advisory DSA-700-1 at http://www.debian.org/security/2005/dsa-700 |
Related URL |
CVE-2005-0386 (CVE) |
Related URL |
12945 (SecurityFocus) |
Related URL |
19905 (ISS) |
|