MailEnable Web Mail Client Multiple HTML Injection and Cross-Site Scripting Vulnerabilities

MailEnable Web Mail Client is prone to multiple HTML-njection and cross-site scripting vulnerabilities because the application fails to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would run in the context of the affected site, potentially allowing an attacker to steal cookie-based authentication credentials. The attacker could also exploit the HTML-injection issues to control how the site is rendered to the user; other attacks are also possible.

These issues affect MailEnable Professional version 2.351; other versions may also be vulnerable.


 

Privacy Statement
Copyright 2010, SecurityFocus