exploit-db-mirror/platforms/php/webapps/24291.txt
Offensive Security fffbf04102 Updated
2013-12-03 19:44:07 +00:00

9 lines
No EOL
611 B
Text
Executable file

source: http://www.securityfocus.com/bid/10756/info
Outblaze Webmail is reported prone to an-HTML injection vulnerability because the application fails to properly sanitize user-supplied HTML email content.
An attacker may be able to inject HTML and script code into the application through HTML email because it isn't properly sanitized.
An attacker can exploit this issue to access an unsuspecting user's cookie-based authentication credentials and to retrieve personal email. Other attacks are also possible.
<IMG SRC="javasc&#X0A;ript:alert (document.cookie)";" border="0" height="1" width="1">