HastyMail HTML Attachment Content-Disposition Header XSS

low Nessus Network Monitor Plugin ID 2167

Synopsis

The remote host is vulnerable to a Script Injection attack.

Description

The remote host is running HastyMail, a PHP-based mail client application. There is a flaw in the remote version of this software that may allow an attacker to execute arbitrary javascript code on the hosts of users of this software. To exploit this flaw, an attacker would need to send an email to a victim using HastyMail containing a malicious HTML attachment. When the victim attempts to read the attachment, a web browser may attempt to render the HTML file. An attacker may use this flaw to steal the cookies of the victim and therefore get access to their mailbox or perform other attacks.

Solution

Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.

Plugin Details

Severity: Low

ID: 2167

Family: Web Servers

Published: 8/27/2004

Updated: 3/6/2019

Nessus ID: 14370

Risk Information

VPR

Risk Factor: Low

Score: 3.0

CVSS v2

Risk Factor: Medium

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

CVSS v3

Risk Factor: Low

Base Score: 3.7

Temporal Score: 3.6

Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N

Temporal Vector: CVSS:3.0/E:H/RL:O/RC:X

Vulnerability Information

CPE: cpe:/a:hastymail:hastymail

Reference Information

CVE: CVE-2004-2704

BID: 11022