by r0t,der4444,cembo,VietMafia

Wednesday, April 19, 2006

CommuniMail XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 19 april 2006
vendor:http://www.sibsoft.net/communimail.html
affected versions: 1.2 and previous
###############################################

Vuln. Description:

IntelliLink Pro contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "list_id" paremeter in "mailadmin.cgi" and input passed to "form_id" paremeter in "templates.cgi" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

examples:

/cgi-bin/communimail/mailadmin.cgi?saction=
show_contacts&list_id=[XSS]

/cgi-bin/communimail/templates.cgi?saction=
edit_form&form_id=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

2 Comments:

Blogger VietMafia told...

r0t,
let fix the copy & paste typo error!:)

9:54 AM

 
Blogger r0t told...

copy&paste typo error? what did you mean? :)

5:55 PM

 

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew