HastyMail HTML Attachment Content-Disposition Header XSS

Medium Nessus Network Monitor Plugin ID 2167


The remote host is vulnerable to a Script Injection attack.


The remote host is running HastyMail, a PHP-based mail client application. There is a flaw in the remote version of this software that may allow an attacker to execute arbitrary javascript code on the hosts of users of this software. To exploit this flaw, an attacker would need to send an email to a victim using HastyMail containing a malicious HTML attachment. When the victim attempts to read the attachment, a web browser may attempt to render the HTML file. An attacker may use this flaw to steal the cookies of the victim and therefore get access to their mailbox or perform other attacks.


Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.

Plugin Details

Severity: Medium

ID: 2167

File Name: 2167.prm

Family: Web Servers

Published: 2004/08/27

Modified: 2016/01/21

Dependencies: 1442

Nessus ID: 14370

Risk Information

Risk Factor: Medium


Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C


Base Score: 5.3

Temporal Score: 5.1


Temporal Vector: CVSS3#E:H/RL:O/RC:X

Reference Information

CVE: CVE-2004-2704

BID: 11022

OSVDB: 9131