First published: Tue Jun 27 2006(Updated: )
Cross-site scripting (XSS) vulnerability in Open WebMail (OWM) 2.52, and other versions released before 05/12/2006, allows remote attackers to inject arbitrary web script or HTML via the (1) To and (2) From fields in openwebmail-main.pl, and possibly (3) other unspecified vectors related to "openwebmailerror calls that need to display HTML."
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Webmail | =1.7 | |
Open Webmail | =2.41 | |
Open Webmail | =1.81 | |
Open Webmail | =2.30 | |
Open Webmail | =2.21 | |
Open Webmail | =2.51 | |
Open Webmail | =1.71 | |
Open Webmail | =2.31 | |
Open Webmail | =2.5 | |
Open Webmail | =2.20 | |
Open Webmail | =1.8 | |
Open Webmail | =1.90 | |
Open Webmail | =2.32 | |
Open Webmail | <=2.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3229 is rated as a medium severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2006-3229, update Open WebMail to version 2.52 or later, which includes patches for the identified vulnerabilities.
Open WebMail versions before 2.52, including versions 1.7 through 2.51, are affected by CVE-2006-3229.
CVE-2006-3229 allows attackers to inject arbitrary web scripts or HTML into the application, potentially leading to theft of user data or session hijacking.
Yes, CVE-2006-3229 can be exploited remotely by attackers through manipulated input in the email fields.