Mirapoint Web Mail - 'Expression()' HTML Injection

Author: LegendaryZion
type: webapps
platform: php
port: 
date_added: 2006-10-31  
date_updated: 2013-10-12  
verified: 1  
codes: CVE-2006-5712;OSVDB-33820  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 28891.txt  
source: https://www.securityfocus.com/bid/20840/info

Mirapoint Web Mail is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data.

An attacker can exploit this issue to execute arbitrary JavaScript in the victim's browser.

<IMG style="width: expression(alert('expression'));">