header-logo
Suggest Exploit
vendor:
BasiliX Webmail
by:
Unknown
7.5
CVSS
HIGH
Email header HTML injection
79
CWE
Product Name: BasiliX Webmail
Affected Version From: Unknown
Affected Version To: Unknown
Patch Exists: Unknown
Related CWE: Not specified
CPE: a:basilix_project:basilix_webmail
Metasploit:
Other Scripts:
Platforms Tested: Unknown
Unknown

BasiliX Webmail Email Header HTML Injection Vulnerability

The BasiliX Webmail application is vulnerable to an email header HTML injection vulnerability. This occurs due to the failure of the application to properly sanitize user-supplied email header strings. An attacker can exploit this vulnerability to gain access to a user's cookie-based authentication credentials and potentially disclose personal email. Other attacks are also possible.

Mitigation:

To mitigate this vulnerability, it is recommended to update BasiliX Webmail to a version that properly sanitizes user-supplied email header strings. Additionally, users should exercise caution when opening emails from untrusted sources.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/10662/info

BasiliX Webmail is reported to be prone to an email header HTML injection vulnerability. This issue is due to a failure of the application to properly sanitize user-supplied email header strings.

An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials; disclosure of personal email is possible. Other attacks are also possible.

Content-Type: application/octet-stream"<script>window.alert(document.cookie)</script>"; name=top_secret.pdf
cqrsecured