Google Search: intitle:”EMUMAIL – Login” “Powered by EMU Webmail”
klouw rates this entry 6 out of 10.
Submitted: 2004-10-12 00:00:00
Added by: klouw
The failure to strip script tags in emumail.cgi allows for XSS type of attack. Vulnerable systems: * EMU Webmail version 5.0 * EMU Webmail version 5.1.0 Depending on what functions you throw in there, you get certain contents of the emumail.cgi file. The vulnerability was discovered in an obsolete script named userstat.pl shipped with Open Webmail. The script doesn’t properly filter out shell characters from the loginname parameter. http://www.securityfocus.com/bid/9861