TIPS MailPost append Parameter XSS

This script is Copyright (C) 2004-2012 Tenable Network Security, Inc.


Synopsis :

A web application running on the remote host has a cross-site scripting
vulnerability.

Description :

TIPS MailPost, a web application used for emailing HTML form data to a
third party, is installed on the remote host.

The version of MailPost hosted on the remote web server has a cross-site
scripting vulnerability in the 'append' variable of mailpost.exe when
debug mode is enabled. Debug mode is enabled by default. A remote
attacker could exploit this to impersonate legitimate users.

This version of MailPost reportedly has other vulnerabilities, though
Nessus has not checked for those issues.

Solution :

Disable debug mode.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:H/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 15626 (mailpost_multiple_flaws.nasl)

Bugtraq ID: 11596

CVE ID: CVE-2004-1101