header-logo
Suggest Exploit
vendor:
SurgeMail
by:
Unknown
7.5
CVSS
HIGH
Cross-Site Scripting
79
CWE
Product Name: SurgeMail
Affected Version From: 4.3e
Affected Version To: Unknown
Patch Exists: NO
Related CWE: Unknown
CPE: a:surgemail:surgemail:4.3e
Metasploit:
Other Scripts:
Platforms Tested:
Unknown

Cross-Site Scripting Vulnerability in SurgeMail

SurgeMail is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input. An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

Mitigation:

To mitigate this vulnerability, it is recommended to apply the latest security patches provided by the vendor. Additionally, input validation and output encoding should be implemented to sanitize user-supplied input and prevent script execution.
Source

Exploit-DB raw data:

source: https://www.securityfocus.com/bid/43679/info

SurgeMail is prone to a cross-site scripting vulnerability because it fails to sufficiently sanitize user-supplied input.

An attacker may leverage this issue to execute arbitrary script code in the browser of an unsuspecting user in the context of the affected site. This can allow the attacker to steal cookie-based authentication credentials and launch other attacks.

The issue affects version 4.3e; other versions may also be affected.

http://www.example.com/surgeweb?username_ex="/><scri<script>alert(document.cookie);</script><input type="hidden