[] NeoSense

Mojo Mail 2.7 - Email Form Cross-Site Scripting

Author: Daniel Boland
type: webapps
platform: cgi
port: 
date_added: 2002-10-24 
date_updated: 2012-10-14 
verified: 1 
codes: CVE-2002-2193;OSVDB-59035 
tags: 
aliases:  
screenshot_url:  
application_url: 

source: https://www.securityfocus.com/bid/6040/info

Mojo Mail does not filter HTML tags from URI parameters, making it prone to cross-site scripting attacks.

As a result, it is possible for a remote attacker to create a malicious link containing script code which will be executed in the browser of a legitimate user, in the context of the website running Mojo Mail.

This issue may be exploited to steal cookie-based authentication credentials from legitimate users of the website running the vulnerable software.

http://www.example.com/cgi-bin/mojo/mojo.cgi?flavor=subscribe&email=%3Cscript%3Ealert%28%22XSS%20Vuln.%22%29%3C%2Fscript%3E&list=skazat_design_newsletter&submit=Submit