Synopsis
The remote host is vulnerable to a Script Injection attack.
Description
The remote host is running HastyMail, a PHP-based mail client application. There is a flaw in the remote version of this software that may allow an attacker to execute arbitrary javascript code on the hosts of users of this software. To exploit this flaw, an attacker would need to send an email to a victim using HastyMail containing a malicious HTML attachment. When the victim attempts to read the attachment, a web browser may attempt to render the HTML file. An attacker may use this flaw to steal the cookies of the victim and therefore get access to their mailbox or perform other attacks.
Solution
Upgrade to Hastymail 1.0.2 or 1.2.0 or higher.
Plugin Details
Nessus ID: 14370
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Temporal Vector: CVSS:3.0/E:H/RL:O/RC:X
Vulnerability Information
CPE: cpe:/a:hastymail:hastymail