First published: Fri Dec 31 2004(Updated: )
Hastymail 1.0.1 and earlier (stable) and 1.1 and earlier (development) does not send the "attachment" parameter in the Content-Disposition field for attachments, which causes the attachment to be rendered inline by Internet Explorer when the victim clicks the download link, which facilitates cross-site scripting (XSS) and possibly other attacks.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Internet Explorer | ||
Phlymail | <=1.0.1 | |
Phlymail | <=1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-2704 is considered a medium severity vulnerability due to its potential for facilitating cross-site scripting attacks.
To fix CVE-2004-2704, upgrade to a version of Hastymail that includes a proper implementation of the Content-Disposition header.
CVE-2004-2704 affects Hastymail versions 1.0.1 and earlier in the stable release, as well as 1.1 and earlier in the development release.
CVE-2004-2704 facilitates cross-site scripting attacks by improperly handling attachment parameters.
Yes, CVE-2004-2704 can specifically affect users of Internet Explorer by causing attachments to render inline instead of being downloaded.