SmarterMail Subject Field XSS

This script is Copyright (C) 2008-2011 Tenable Network Security, Inc.


Synopsis :

The remote web server contains an ASP application that is affected by
a cross-site scripting vulnerability.

Description :

The remote host is running SmarterMail, an email and collaboration
server for Windows.

The webmail component of the version of SmarterMail installed on the
remote host fails to sanitize the Subject field of messages before
using it to generate dynamic HTML output. An unauthenticated attacker
may be able to exploit this to inject arbitrary HTML and script code
into a user's browser to be executed within the security context of
the affected site.

See also :

http://www.securityfocus.com/archive/1/archive/1/488313/100/0/threaded
http://www.smartertools.com/products/smartermail/ReleaseNotesV4.aspx

Solution :

Upgrade to version 4.3.2981 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 4.1
(CVSS2#E:F/RL:U/RC:ND)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 31787 ()

Bugtraq ID: 27878

CVE ID: CVE-2008-0872