First published: Tue Aug 07 2007(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Open Webmail (OWM) 2.52 20060831 and earlier allow remote attackers to inject arbitrary web script or HTML via the (1) searchtype, (2) longpage, and (3) page parameters to (a) openwebmail-main.pl; the (4) prefs_caller, (5) userfirsttime, (6) page, (7) sort, (8) folder, and (9) message_id parameters to (b) openwebmail-prefs.pl; the (10) compose_caller, (11) msgdatetype, (12) keyword, (13) searchtype, (14) folder, (15) page, and (16) sort parameters to (c) openwebmail-send.pl; the (17) folder, (18) page, and (19) sort parameters to (d) openwebmail-folder.pl; the (20) searchtype, (21) page, (22) filesort, (23) singlepage, (24) showhidden, (25) showthumbnail, and (26) message_id parameters to (e) openwebmail-webdisk.pl; the (27) folder parameter to (f) openwebmail-advsearch.pl; and the (28) abookcollapse, (29) abooksearchtype, (30) abooksort, (31) abooklongpage, (32) abookpage, (33) message_id, (34) searchtype, (35) msgdatetype, (36) sort, (37) page, (38) rootxowmuid, and (39) listviewmode parameters to (g) openwebmail-abook.pl, different vectors than CVE-2005-2863, CVE-2006-2190, CVE-2006-3229, and CVE-2006-3233.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Open Webmail | <=2.52 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4172 has a moderate severity rating due to its potential for cross-site scripting attacks.
To fix CVE-2007-4172, upgrade to Open Webmail version 2.53 or later to eliminate the XSS vulnerabilities.
CVE-2007-4172 affects Open Webmail versions 2.52 and earlier.
CVE-2007-4172 can facilitate cross-site scripting attacks that allow the injection of arbitrary web scripts.
Yes, CVE-2007-4172 can be exploited remotely by attackers to execute malicious scripts in the context of a user's session.