Rudi Benkovic JAWMail 1.0 - Script Injection

Author: Ulf Harnhammar
type: webapps
platform: php
port: 
date_added: 2002-09-23  
date_updated: 2012-10-09  
verified: 1  
codes: CVE-2002-1495;OSVDB-10331  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 21817.txt  
source: https://www.securityfocus.com/bid/5771/info

Problems with JAWMail could make it possible to execute arbitrary script code in a vulnerable client.

JAWMail does not sufficiently filter malicious HTML code from e-mails. As a result, when a user opens an email in JAWMail that contains malicious HTML code, the code contained in the mail would be executed in the browser of the mail user.

<b onMouseOver="alert(document.cookie)">bolder</b>