bugtraq logo

Bugtraq mailing list archives

Previous By Date Next
Previous By Thread Next

JAWmail XSS


From: Ulf Harnhammar <ulfh () update uu se>
Date: 2002年9月23日 02:27:43 +0200 (CEST)

JAWmail XSS
PROGRAM: JAWmail
VENDOR: Rudi Benkovic <rudi () jawmail org> et al.
HOMEPAGE: http://www.jawmail.org/
VULNERABLE VERSIONS: 1.0-rc1, possibly others
IMMUNE VERSIONS: 2.0-rc1 and later
LOGIN REQUIRED: no
SEVERITY: high
DESCRIPTION:
JAWmail (Just Another Web Mail) is a pretty ambitious web mail
client project. It is written in PHP, and it is published under
the GNU GPL.
SUMMARY:
There are several cross-site scripting holes in JAWmail that are
triggered by reading incoming e-mail messages. An attacker can
use them to take over a victim's e-mail account by simply sending
certain malicious e-mails to the victim.
TECHNICAL DETAILS:
1) Read Mail shows the names of attached files without cleaning
those names (removing HTML elements).
2) text/html mails are not cleaned at all, when they are shown in
a pop-up window.
3) When Read Mail displays text/html mails, they are cleaned with
PHP's strip_tags() function with some appropriate parameters. This
function removes evil HTML elements, but not nice HTML elements
with evil HTML attributes, so you can still perform XSS attacks like:
<b onMouseOver="alert(document.cookie)">bolder</b>
// Ulf Harnhammar
ulfh () update uu se
http://www.metaur.nu/

Previous By Date Next
Previous By Thread Next

Current thread:

  • JAWmail XSS Ulf Harnhammar (Sep 23)

AltStyle によって変換されたページ (->オリジナル) /