Korean
<< Back
VID 21722
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Open WebMail program is vulnerable to a cross-site scripting vulnerability via the sessionid parameter. Open WebMail is an open-source Web mail system based on the Neomail version 1.14 from Ernie Miller, written in Perl for Unix-based operating systems. Open WebMail version 2.41 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the 'sessionid' parameter of the 'openwebmail-main.pl' script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* References:
http://www.frsirt.com/english/advisories/2005/1666
http://online.securityfocus.com/archive/1/409692/30/0/threaded

* Platforms Affected:
Open WebMail Project, Open WebMail version 2.41 and earlier versions
Linux Any version
Unix Any version
Recommendation No upgrade or patch available as of October 2005.

Upgrade to the latest version of Open WebMail, when new fixed version becomes available from the Open WebMail Download Web page at http://openwebmail.org/openwebmail/download/
Related URL CVE-2005-2863 (CVE)
Related URL 14771 (SecurityFocus)
Related URL 22202 (ISS)