TIPS MailPost append Parameter XSS

This script is Copyright (C) 2004-2015 Tenable Network Security, Inc.

Synopsis :

A web application running on the remote host has a cross-site scripting

Description :

TIPS MailPost, a web application used for emailing HTML form data to a
third party, is installed on the remote host.

The version of MailPost hosted on the remote web server has a cross-site
scripting vulnerability in the 'append' variable of mailpost.exe when
debug mode is enabled. Debug mode is enabled by default. A remote
attacker could exploit this to impersonate legitimate users.

This version of MailPost reportedly has other vulnerabilities, though
Nessus has not checked for those issues.

Solution :

Disable debug mode.

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.3
Public Exploit Available : true

Family: CGI abuses : XSS

Nessus Plugin ID: 15626 (mailpost_multiple_flaws.nasl)

Bugtraq ID: 11596

CVE ID: CVE-2004-1101

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now