Lucene search

K
securityvulnsSecurityvulnsSECURITYVULNS:DOC:12300
HistoryApr 19, 2006 - 12:00 a.m.

CommuniMail XSS vuln.

2006-04-1900:00:00
vulners.com
5

CommuniMail XSS vuln.

###############################################
Vuln. discovered by : r0t
Date: 19 april 2006
vendor:http://www.sibsoft.net/communimail.html
affected versions: 1.2 and previous
orginal advisory:
http://pridels.blogspot.com/2006/04/communimail-xss-vuln.html
###############################################

Vuln. Description:

IntelliLink Pro contains a flaw that allows a remote cross site scripting
attack. This flaw exists because input passed to "list_id" paremeter in "
mailadmin.cgi" and input passed to "form_id" paremeter in "templates.cgi"
isn't properly sanitised before being returned to the user.
This could allow a user to create a specially crafted URL that would execute
arbitrary code in a user's browser within the trust relationship between the
browser and the server, leading to a loss of integrity.

examples:

/cgi-bin/communimail/mailadmin.cgi?saction=
show_contacts&list_id=[XSS]

/cgi-bin/communimail/templates.cgi?saction=
edit_form&form_id=[XSS]

###############################################
Solution:
Edit the source code to ensure that input is properly sanitised.
###############################################
More information @ unsecured-systems.com/forum/