icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

HastyMail HTML Attachment Content-Disposition Header XSS

Medium

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running HastyMail, a PHP-based mail client application. There is a flaw in the remote version of this software that may allow an attacker to execute arbitrary javascript code on the hosts of users of this software. To exploit this flaw, an attacker would need to send an email to a victim using HastyMail containing a malicious HTML attachment. When the victim attempts to read the attachment, a web browser may attempt to render the HTML file. An attacker may use this flaw to steal the cookies of the victim and therefore get access to their mailbox or perform other attacks.

Solution

Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.