Mailreader network.cgi enriched/richtext MIME Message XSS

medium Nessus Plugin ID 17661

Synopsis

The remote host contains a CGI script that is vulnerable to a cross- site scripting attack.

Description

According to its banner, the version of Mailreader installed on the remote host is affected by a remote HTML injection vulnerability due to its failure to properly sanitize messages using a 'text/enriched' or 'text/richtext' MIME type. An attacker can exploit this flaw by sending a specially crafted message to a user who reads his mail with Mailreader. Then, when the user reads that message, malicious HTML or script code embedded in the message will be run by the user's browser in the context of the remote host, enabling the attacker to steal authentication cookies as well as perform other attacks.

Solution

Upgrade to Mailreader 2.3.36 or later.

Plugin Details

Severity: Medium

ID: 17661

File Name: mailreader_html_injection.nasl

Version: 1.17

Type: remote

Published: 3/30/2005

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Ease: No exploit is required

Vulnerability Publication Date: 3/30/2005

Reference Information

CVE: CVE-2005-0386

BID: 12945

CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990

DSA: 700