BasiliX Webmail 1.1 - Email Header HTML Injection
Author: Roman Medina-Heigl Hernandez
type: webapps
platform: cgi
port:
date_added: 2004-07-05
date_updated: 2013-01-20
verified: 1
codes: OSVDB-7958
tags:
aliases:
screenshot_url:
application_url:
source: https://www.securityfocus.com/bid/10662/info
BasiliX Webmail is reported to be prone to an email header HTML injection vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied email header strings.
An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials; disclosure of personal email is possible. Other attacks are also possible.
Content-Type: application/octet-stream"<script>window.alert(document.cookie)</script>"; name=top_secret.pdf