Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12451
HistoryApr 28, 2006 - 12:00 a.m.

Kmail <=2.3 vuln.

2006-04-2800:00:00
vulners.com
5

Kmail <=2.3 vuln.

###############################################
Vulnerability discovered by : r0t
Date: 28 april 2006
vendorlink:www.webofall.com/displaynews.php?id=4
affected versions:2.3 and prior
orginal advisory:http://pridels.blogspot.com/2006/04/kmail-23-vuln.html
###############################################

Vuln. Description:

  1. Multiple Cross-Site Scripting attack vulnerabilities.

Kmail contains a flaws that allows a remote cross site scripting attack.
Those flaws exists because input passed to "id" paremeter in "main.php" and
input passed to "ordner" paremeter in "main.php","webdisk.php" and input
passed to "draft" paremeter in "compose.php" and input passed to "m","y"
paremeter in "calendar.php" isn't properly sanitised before being returned
to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/main.php?action=showmail&id=[XSS]&bmsession
=b77f6a49569a0e6e2d35a8c14cd3ace2

/main.php?ordner=[XSS]&bmsession=1f2a3aeb01f
d5253be322a704e53469f

/compose.php?bmsession=1f2a3aeb01fd5253be32
2a704e53469f&draft=[XSS]

/webdisk.php?bmsession=1f2a3aeb01fd5253be32
2a704e53469f&ordner=[XSS]

/calendar.php?action=viewMonth&m=[XSS]&y=200
6&bmsession=1f2a3aeb01fd5253be322a704e53469f

/calendar.php?action=viewMonth&m=5&y=[XSS]&b
msession=1f2a3aeb01fd5253be322a704e53469f

2.Full Path Disclosure.

example:

/calendar.php?d=[CODE]&m=&y=&bmsession=5825
d89388de35f8f65ec106c6e3537b

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/