by r0t,der4444,cembo,VietMafia

Thursday, April 27, 2006

Open WebMail <=2.51 XSS vuln.

###############################################
Vulnerability discovered by : r0t
Date: 27 april 2006
vendorlink:http://openwebmail.org/
affected versions:2.51 and prior
###############################################


Vuln. Description:


Open WebMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because input passed to "sessionid" paremeter in "openwebmail-send.pl",
"openwebmail-advsearch.pl","openwebmail-folder.pl","openwebmail-prefs.pl",
"openwebmail-abook.pl","openwebmail-main.pl","openwebmail-read.pl",
"openwebmail-cal.pl","openwebmail-webdisk.pl" isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

examples:

/openwebmail-send.pl?sessionid=[XSS]
/openwebmail-advsearch.pl?sessionid=[XSS]
/openwebmail-folder.pl?action=editfolders&sessionid=[XSS]
/openwebmail-prefs.pl?action=editprefs&sessionid=[XSS]
/openwebmail-abook.pl?sessionid=[XSS]
/openwebmail-main.pl?sessionid=[XSS]
/openwebmail-read.pl?sessionid=[XSS]
/openwebmail-cal.pl?sessionid=[XSS]
/openwebmail-webdisk.pl?action=showdir&sessionid=[XSS]


###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/

0 Comments:

Post a Comment

<< Home

 
Copyright (c) 2006 Pridels Sec Crew