On Thu, 8 Sep 2005 10:06:53 +0200
Stefan Hornburg <[EMAIL PROTECTED]> wrote:

> package: sqwebmail
> severity: important
> tags: security
> 
> Secunia Research has discovered a vulnerability in SqWebMail, which
> can be exploited by malicious people to conduct script insertion
> attacks.
> 
> The vulnerability is caused due to SqWebMail allowing usage of e.g.
> the "<script>" tag within an HTML comment. This, combined with
> "Conditional Comments" in Internet Explorer, can be exploited to
> execute arbitrary script code in a user's browser session in context
> of a vulnerable site when a malicious email is viewed.
> 
> Successful exploitation requires that the user is using Internet 
> Explorer.
> 
> Example in an HTML email:
> <!--[if IE]>
> <script>alert("Vulnerable!");</script>
> <![endif]-->
> 
> See http://secunia.com/secunia_research/2005-44/advisory/ for more 
> information.

Attached is a patch for this and the other XSS vulnerability described in 
#327727.

Bye
        Racke


-- 
LinuXia Systems => http://www.linuxia.de/
Expert Interchange Consulting and System Administration
ICDEVGROUP => http://www.icdevgroup.org/
Interchange Development Team

Attachment: CAN-2005-2724.patch
Description: Binary data

Reply via email to