BasiliX Webmail 1.1 – Email Header HTML Injection

BasiliX Webmail 1.1 – Email Header HTML Injection

漏洞ID 1054510 漏洞类型
发布时间 2004-07-05 更新时间 2004-07-05
图片[1]-BasiliX Webmail 1.1 – Email Header HTML Injection-安全小百科CVE编号 N/A
图片[2]-BasiliX Webmail 1.1 – Email Header HTML Injection-安全小百科CNNVD-ID N/A
漏洞平台 CGI CVSS评分 N/A
|漏洞来源
https://www.exploit-db.com/exploits/24254
|漏洞详情
漏洞细节尚未披露
|漏洞EXP
source: http://www.securityfocus.com/bid/10662/info

BasiliX Webmail is reported to be prone to an email header HTML injection vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied email header strings.

An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials; disclosure of personal email is possible. Other attacks are also possible.

Content-Type: application/octet-stream"<script>window.alert(document.cookie)</script>"; name=top_secret.pdf

相关推荐: PHP-Nuke Multiple Input Validation Vulnerabilities

PHP-Nuke Multiple Input Validation Vulnerabilities 漏洞ID 1098275 漏洞类型 Input Validation Error 发布时间 2004-06-11 更新时间 2004-06-11 CVE编号 …

© 版权声明
THE END
喜欢就支持一下吧
点赞0
分享