header-logo
Suggest Exploit
vendor:
Hastymail2
by:
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: Hastymail2
Affected Version From: 2.1.2001
Affected Version To: Unknown
Patch Exists: NO
Related CWE:
CPE: a:hastymail2_project:hastymail2:2.1.1
Metasploit:
Other Scripts:
Platforms Tested: Unknown

Hastymail2 Cross-Site Scripting Vulnerability

Hastymail2 is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to sanitize user-supplied data before displaying it on web pages. Input validation and output encoding can be used to prevent cross-site scripting attacks.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/50789/info

Hastymail2 is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied data.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This may allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Hastymail2 2.1.1 is vulnerable; other versions may also be affected. 

GET: http://<app_base>/index.php?page=mailbox&mailbox=Drafts
POST: rs=<script>alert(&#039;xss&#039;)</script>