Korean
<< Back
VID 21839
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The NeoMail, according to its version number, has a cross-site scripting vulnerability in the neomail.pl script. NeoMail is an open-source webmail application written in Perl. NeoMail version 1.27 and earlier versions are vulnerable to a cross-site scripting vulnerability, caused by improper validation of user-supplied input passed to the sort parameter of the neomail.pl script. This vulnerability could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of NeoMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/423901/30/0/threaded
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/041914.html

* Platforms Affected:
NeoCode Solutions, Inc., NeoMail version 1.27 and earlier versions
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of NeoMail (1.28 or later), available from the NeoMail Web site at http://neocodesolutions.com/software/neomail/
Related URL CVE-2006-0536 (CVE)
Related URL (SecurityFocus)
Related URL 24470 (ISS)