[+] Post Title : 
MailEnable Webmail Cross-Site Scripting Vulnerability
[+] Date : Rabu, 01 Februari 2012
[+] Author : Dr. Cruzz
[+] Link : https://xcruzz.blogspot.com/2012/02/mailenable-webmail-cross-site-scripting.html
[+] Type :         
Exploit
EDB-ID: 18447    CVE: 2012-0389    OSVDB-ID: N/A
Author: Sajjad Pourali
Exploit Code
ME020567: MailEnable webmail cross-site scripting vulnerability (CWE-79)
| References: CVE-2012-0389 | 
| Discovered by: Sajjad Pourali, Narendra Shinde and Shahab NamaziKhah | 
| Vendor advisory: http://www.mailenable.com/kb/Content/Article.asp?ID=me020567 | 
| Vendor contact: 2012-01-04 09:49:36 UTC | 
| Vendor response: 2012-01-04 10:27:13 UTC (Peter Fregon from MailEnable) | 
| Vendor fix and announcement: 2012-01-10 00:50:31 UTC | 
| Vulnerability description: | 
| MailEnable  <http://www.mailenable.com/> Professional and Enterprise versions  are prone to cross-site scripting vulnerabilities as the user-supplied  input received via "Username" parameter of "ForgottonPassword.aspx" page  is not properly sanitized. A specially crafted URL which a user clicks  could gain access to the users cookies for webmail or execute other  malicious code in users browser in context of the domain in use. | 
| Authentication required: no | 
| User interaction required: yes | 
| - MailEnable Professional, Enterprise & Premium 4.26 and earlier | 
| - MailEnable Professional, Enterprise & Premium 5.52 and earlier | 
| - MailEnable Professional, Enterprise & Premium 6.02 and earlier | 
| - MailEnable Standard is not affected. | 
| http://server/mewebmail/Mondo/lang/sys/ForgottenPassword.aspx?Username='};alert(/XSS/);{' | 
| Users  of MailEnable 5 and 6 can resolve the issue by upgrading to version  5.53 or 6.03 or later. Alternatively, and for version 4 users, the  following fix can be applied: | 
| 1)  Open the ForgottenPassword.aspx file in Notepad. This file is in the  Mail Enable\bin\NETWebMail\Mondo\lang\[language] folders in version 4  and in Mail Enable\bin\NETWebMail\Mondo\lang\sys in version 5 and 6. | 
2)  Locate and remove the following line, then save the file:  document.getElementById("txtUsername").value = '<%=  Request.Item("Username") %>';
 
0 komentar:
Posting Komentar