|
Family: CGI abuses : XSS --> Category: infos
Open WebMail sessionid Parameter Cross-Site Scripting Vulnerability Vulnerability Scan
Vulnerability Scan Summary Checks for sessionid parameter cross-site scripting vulnerability in Open WebMail
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script which is vulnerable to a
cross site scripting attack.
Description :
The installed version of Open WebMail on the remote host is prone to
cross-site scripting attacks because it fails to sanitize user-
supplied input to the 'sessionid' parameter of the
'openwebmail-main.pl' script.
See also :
http://online.securityfocus.com/archive/1/409692/30/0/threaded
Solution :
Unknown at this time.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:P/A:N/I:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|