First published: Thu Jun 24 2004(Updated: )
Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Inter7 Vpopmail (vchkpw) | =4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0591 has a moderate severity rating due to its potential for cross-site scripting attacks.
To fix CVE-2004-0591, upgrade SqWebMail to version 4.0.5 or later.
CVE-2004-0591 allows remote attackers to inject arbitrary web scripts or HTML into the application.
CVE-2004-0591 affects SqWebMail versions 4.0.4 and earlier, as well as potentially 3.x versions.
CVE-2004-0591 can be exploited through malicious e-mail headers or messages with a 'message/delivery-status' MIME type.