[<prev] [next>] [day] [month] [year] [list]
Message-ID: <d17cec00907230909y308b5da4m1c99432b868b72ae@mail.gmail.com>
Date: Thu, 23 Jul 2009 18:09:09 +0200
From: Andrea Purificato - bunker <andrea.purificato@...il.com>
To: bugtraq@...urityfocus.com, full-disclosure@...ts.grok.org.uk
Subject: Stored XSS on Communigate Pro 5.2.14 and prior
versions
- Description
The Communigate Pro webmail framework is prone to a stored Cross Site
Scripting vulnerability through crafted plain text email messages.
- Affected version:
5.2.14 and prior as reported from Communigate:
http://www.communigate.com/cgatepro/History52.html
- Details
This vulnerability can be exploited if an attacker sends a plain text
message to the victim address containing a malicious crafted URL;
the internal parser fails to parse the malicious URL and executes
Javascript code every time user reads the message.
An attacker may be able to use this vulnerability to steal sensitive
information from a user's computer (e.g. current SessionID) or force
the user's computer to execute stealed operations.
- Example of crafted URL
http://www.example.com/&z="><script>alert(document.cookie)</script>&f=
- Patch
Install Communigate Pro 5.2.13
5.2.15 15-Jul-2009: * Bug Fix: WebUser: 5.1.2: links in plain text
messages could be processed incorrectly.
- Communigate
http://www.communigate.com/cgatepro/
--
Andrea Purificato
http://rawlab.mindcreations.com
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
Powered by blists - more mailing lists