Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12450
HistoryApr 28, 2006 - 12:00 a.m.

Open WebMail <=2.51 XSS vuln.

2006-04-2800:00:00
vulners.com
18

Open WebMail <=2.51 XSS vuln.

###############################################
Vulnerability discovered by : r0t
Date: 27 april 2006
vendorlink:http://openwebmail.org/
affected versions:2.51 and prior
orginal advisory:
http://pridels.blogspot.com/2006/04/open-webmail-251-xss-vuln.html
###############################################

Vuln. Description:

Open WebMail contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to "sessionid" paremeter in "
openwebmail-send.pl",
"openwebmail-advsearch.pl","openwebmail-folder.pl","openwebmail-prefs.pl",
"openwebmail-abook.pl","openwebmail-main.pl","openwebmail-read.pl","
openwebmail-cal.pl","openwebmail-webdisk.pl" isn't properly sanitised
before being returned to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/openwebmail-send.pl?sessionid=[XSS]
/openwebmail-advsearch.pl?sessionid=[XSS]
/openwebmail-folder.pl?action=editfolders&sessionid=[XSS]
/openwebmail-prefs.pl?action=editprefs&sessionid=[XSS]
/openwebmail-abook.pl?sessionid=[XSS]
/openwebmail-main.pl?sessionid=[XSS]
/openwebmail-read.pl?sessionid=[XSS]
/openwebmail-cal.pl?sessionid=[XSS]
/openwebmail-webdisk.pl?action=showdir&sessionid=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/