Open WebMail openwebmail.pl logindomain Parameter XSS

This script is Copyright (C) 2005-2011 George A. Theall


Synopsis :

The remote webmail server is affected by a cross-site scripting flaw.

Description :

The remote host is running at least one instance of Open WebMail that
fails to sufficiently validate user input supplied to the 'logindomain'
parameter. This failure enables an attacker to run arbitrary script
code in the context of a user's web browser.

See also :

http://openwebmail.org/openwebmail/download/cert/advisories/SA-05:01.txt

Solution :

Upgrade to Open WebMail version 2.50 20040212 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.7
(CVSS2#E:H/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 16463 ()

Bugtraq ID: 12547

CVE ID: CVE-2005-0445