HastyMail HTML Attachment Content-Disposition Header XSS

Medium Nessus Network Monitor Plugin ID 2167

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running HastyMail, a PHP-based mail client application. There is a flaw in the remote version of this software that may allow an attacker to execute arbitrary javascript code on the hosts of users of this software. To exploit this flaw, an attacker would need to send an email to a victim using HastyMail containing a malicious HTML attachment. When the victim attempts to read the attachment, a web browser may attempt to render the HTML file. An attacker may use this flaw to steal the cookies of the victim and therefore get access to their mailbox or perform other attacks.

Solution

Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.

Plugin Details

Severity: Medium

ID: 2167

File Name: 2167.prm

Family: Web Servers

Published: 2004/08/27

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 14370

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 5.3

Temporal Score: 5.1

Vector: CVSS3#AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS3#E:H/RL:O/RC:X

Reference Information

CVE: CVE-2004-2704

BID: 11022

OSVDB: 9131