First published: Tue Nov 29 2011(Updated: )
Cross-site scripting (XSS) vulnerability in index.php in Hastymail2 2.1.1 before RC2 allows remote attackers to inject arbitrary web script or HTML via the rs parameter in a mailbox Drafts action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Hastymail | =beta1 | |
Hastymail | =beta2 | |
Hastymail | =beta3 | |
Hastymail | =rc1 | |
Hastymail | =rc2 | |
Hastymail | =rc3 | |
Hastymail | =rc4 | |
Hastymail | =rc5 | |
Hastymail | =rc6 | |
Hastymail | =rc7 | |
Hastymail | =rc8 | |
Hastymail | =rc9 | |
Hastymail | <=2.1.1 | |
Hastymail | =1.0 | |
Hastymail | =1.01 | |
Hastymail | =1.1-rc1 | |
Hastymail | =1.1-rc2 | |
Hastymail | =2.0 | |
Hastymail | =2.0-a1 | |
Hastymail | =2.0-a2 | |
Hastymail | =2.0-b1 | |
Hastymail | =2.0-b2 | |
Hastymail | =2.0-b3 | |
Hastymail | =2.0-rc1 | |
Hastymail | =2.0.1 | |
Hastymail | =2.0.2 | |
Hastymail | =2.0.3 | |
Hastymail | =2.0.4 | |
Hastymail | =2.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2011-4541 is classified as medium due to its potential for cross-site scripting attacks.
To fix CVE-2011-4541, you should validate and sanitize user inputs for the 'rs' parameter in the index.php file.
CVE-2011-4541 affects versions of Hastymail2 prior to RC2, including various beta and release candidate versions.
CVE-2011-4541 is a cross-site scripting (XSS) vulnerability that allows the injection of arbitrary web scripts or HTML.
Yes, CVE-2011-4541 can be exploited remotely by attackers through the vulnerable 'rs' parameter.