Open WebMail Multiple Content Header XSS

This script is Copyright (C) 2004-2011 George A. Theall


Synopsis :

A remote web application may be vulnerable to cross-site scripting.

Description :

The target is running at least one instance of Open WebMail whose
version is 2.32 or earlier. Such versions are vulnerable to a cross-
site scripting attack whereby an attacker can cause a victim to
unknowingly run arbitrary JavaScript code by reading a MIME message
with a specially crafted Content-Type or Content-Description header.
For further information, see :

http://www.openwebmail.org/openwebmail/download/cert/advisories/SA-04:05.txt
http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-2.txt
http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt

***** Nessus has determined the vulnerability exists on the target
***** simply by looking at the version number of Open WebMail
***** installed there.

Solution :

Upgrade to Open WebMail version 2.32 20040603 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 12262 ()

Bugtraq ID: 10667

CVE ID: