MDaemon WorldClient < 10.0.2 Email Handling XSS

This script is Copyright (C) 2008-2013 Tenable Network Security, Inc.


Synopsis :

The remote mail server is prone to a script injection attack.

Description :

The remote host is running Alt-N MDaemon, a mail server for Windows.

According to its banner, a version of MDaemon mail server older than
10.0.2 is installed on the remote host. Such versions ship with a
version of WorldClient (a webmail client) that is affected by a script
injection vulnerability. By tricking a user into opening a specially
crafted email, an attacker can exploit this issue to execute script code
in the user's browser in the security context of the affected
application and thereby steal cookie-based credentials or launch other
attacks.

See also :

http://files.altn.com/MDaemon/Release/RelNotes_en.txt

Solution :

Upgrade to MDaemon 10.0.2 or later.

Risk factor :

Medium / CVSS Base Score : 4.3
(CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N)
CVSS Temporal Score : 3.6
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 34849 ()

Bugtraq ID: 32355

CVE ID: CVE-2008-6967