Synopsis
The remote host contains a CGI script that is vulnerable to a cross- site scripting attack.
Description
According to its banner, the version of Mailreader installed on the remote host is affected by a remote HTML injection vulnerability due to its failure to properly sanitize messages using a 'text/enriched' or 'text/richtext' MIME type. An attacker can exploit this flaw by sending a specially crafted message to a user who reads his mail with Mailreader. Then, when the user reads that message, malicious HTML or script code embedded in the message will be run by the user's browser in the context of the remote host, enabling the attacker to steal authentication cookies as well as perform other attacks.
Solution
Upgrade to Mailreader 2.3.36 or later.
Plugin Details
File Name: mailreader_html_injection.nasl
Supported Sensors: Nessus
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Vulnerability Information
Excluded KB Items: Settings/disable_cgi_scanning
Exploit Ease: No exploit is required
Vulnerability Publication Date: 3/30/2005
Reference Information
CVE: CVE-2005-0386
BID: 12945
CWE: 20, 442, 629, 711, 712, 722, 725, 74, 750, 751, 79, 800, 801, 809, 811, 864, 900, 928, 931, 990
DSA: 700