AXIGEN Webmail < 7.1.0 HTML Body Script Insertion

medium Nessus Plugin ID 38911

Synopsis

The remote webmail service is affected by a cross-site scripting vulnerability.

Description

The version of AXIGEN Webmail running on the remote host is earlier than 7.1.0. Such versions fail to fully sanitize text in the body of email messages. If an attacker can trick a user into opening a specially crafted message using the affected webmail application, this can be leveraged to inject malicious HTML and script code into the user's browser, to be executed within the security context of the affected site.

Solution

Upgrade to AXIGEN version 7.1.0 or later.

See Also

https://www.axigen.com/forum/forum/technical-news/1849-axigen-security-notification?t=5998

Plugin Details

Severity: Medium

ID: 38911

File Name: axigen_7_1_0.nasl

Version: 1.16

Type: remote

Published: 5/27/2009

Updated: 1/19/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.2

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Information

CPE: cpe:/a:gecad:axigen_mail_server

Exploit Ease: No exploit is required

Reference Information

CVE: CVE-2009-1484

BID: 34716

CWE: 79

Secunia: 34402, 34958