VID |
21839 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
The NeoMail, according to its version number, has a cross-site scripting vulnerability in the neomail.pl script. NeoMail is an open-source webmail application written in Perl. NeoMail version 1.27 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the sort parameter of the neomail.pl script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of NeoMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.securityfocus.com/archive/1/423901/30/0/threaded http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/041914.html
* Platforms Affected: NeoCode Solutions, Inc., NeoMail version 1.27 and earlier versions Unix Any version Linux Any version |
Recommendation |
Upgrade to the latest version of NeoMail (1.28 or later), available from the NeoMail Web site at http://neocodesolutions.com/software/neomail/ |
Related URL |
CVE-2006-0536 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
24470 (ISS) |
|