JAWmail XSS

From: Ulf Harnhammar (ulfhat_private)
Date: Sun Sep 22 2002 - 17:27:43 PDT

  • Next message: Jouko Pynnonen: "Technical information about the vulnerabilities fixed by MS-02-52"

    JAWmail XSS
    
    
    PROGRAM: JAWmail
    VENDOR: Rudi Benkovic <rudiat_private> et al.
    HOMEPAGE: http://www.jawmail.org/
    VULNERABLE VERSIONS: 1.0-rc1, possibly others
    IMMUNE VERSIONS: 2.0-rc1 and later
    LOGIN REQUIRED: no
    SEVERITY: high
    
    
    DESCRIPTION:
    
    JAWmail (Just Another Web Mail) is a pretty ambitious web mail
    client project. It is written in PHP, and it is published under
    the GNU GPL.
    
    
    SUMMARY:
    
    There are several cross-site scripting holes in JAWmail that are
    triggered by reading incoming e-mail messages. An attacker can
    use them to take over a victim's e-mail account by simply sending
    certain malicious e-mails to the victim.
    
    
    TECHNICAL DETAILS:
    
    1) Read Mail shows the names of attached files without cleaning
    those names (removing HTML elements).
    
    2) text/html mails are not cleaned at all, when they are shown in
    a pop-up window.
    
    3) When Read Mail displays text/html mails, they are cleaned with
    PHP's strip_tags() function with some appropriate parameters. This
    function removes evil HTML elements, but not nice HTML elements
    with evil HTML attributes, so you can still perform XSS attacks like:
    
    <b onMouseOver="alert(document.cookie)">bolder</b>
    
    
    // Ulf Harnhammar
    ulfhat_private
    http://www.metaur.nu/
    



    This archive was generated by hypermail 2b30 : Mon Sep 23 2002 - 08:39:28 PDT