CVE-2002-1495
CVSS4.3
发布时间 :2003-04-02 00:00:00
修订时间 :2008-09-05 16:30:44
NMCOES    

[原文]Cross-site scripting (XSS) vulnerability in JAWmail 1.0-rc1 allows remote attackers to insert arbitrary script or HTML via (1) attached file names in the Read Mail feature, (2) text/html mails that are displayed in a pop-up window, and (3) certain malicious attributes within otherwise safe tags, such as onMouseOver.


[CNNVD]Rudi Benkovic JAWMail脚本注入漏洞(CNNVD-200304-039)

        JAWmail 1.0-rc1存在跨站脚本(XSS)漏洞。远程攻击者借助(1)读取邮件功能中附加的文件名称,(2)pop-up窗口陈列出来的text/html邮件,和(3)如onMouseOver带有安全标签的某些恶意属性插入任意脚本或者HTML。
        

- CVSS (基础分值)

CVSS分值: 4.3 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:rudi_benkovic:jawmail:1.0_rc1
cpe:/a:rudi_benkovic:jawmail:1.0.1
cpe:/a:rudi_benkovic:jawmail:1.0

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1495
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1495
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200304-039
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/5771
(VENDOR_ADVISORY)  BID  5771
http://www.iss.net/security_center/static/10152.php
(VENDOR_ADVISORY)  XF  jawmail-mail-message-xss(10152)
http://archives.neohapsis.com/archives/bugtraq/2002-09/0270.html
(VENDOR_ADVISORY)  BUGTRAQ  20020922 JAWmail XSS

- 漏洞信息

Rudi Benkovic JAWMail脚本注入漏洞
中危 跨站脚本
2003-04-02 00:00:00 2005-10-20 00:00:00
远程  
        JAWmail 1.0-rc1存在跨站脚本(XSS)漏洞。远程攻击者借助(1)读取邮件功能中附加的文件名称,(2)pop-up窗口陈列出来的text/html邮件,和(3)如onMouseOver带有安全标签的某些恶意属性插入任意脚本或者HTML。
        

- 公告与补丁

        Fixes are available. Users are urged to download and install the newest version of JAWmail:
        Rudi Benkovic JAWmail 1.0
        
        Rudi Benkovic JAWmail 1.0 -rc1
        
        Rudi Benkovic JAWmail 1.0.1
        

- 漏洞信息 (21817)

Rudi Benkovic JAWMail 1.0 Script Injection Vulnerability (EDBID:21817)
php webapps
2002-09-23 Verified
0 Ulf Harnhammar
N/A [点击下载]
source: http://www.securityfocus.com/bid/5771/info

Problems with JAWMail could make it possible to execute arbitrary script code in a vulnerable client.

JAWMail does not sufficiently filter malicious HTML code from e-mails. As a result, when a user opens an email in JAWMail that contains malicious HTML code, the code contained in the mail would be executed in the browser of the mail user.

<b onMouseOver="alert(document.cookie)">bolder</b>		

- 漏洞信息

10331
JAWmail Multiple Mail Content XSS
Remote / Network Access Input Manipulation
Loss of Integrity

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-09-23 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Rudi Benkovic JAWMail Script Injection Vulnerability
Input Validation Error 5771
Yes No
2002-09-23 12:00:00 2009-07-11 05:06:00
Discovery of this vulnerability credited to Ulf Harnhammar <ulfh@update.uu.se>.

- 受影响的程序版本

Rudi Benkovic JAWmail 1.0.1
Rudi Benkovic JAWmail 1.0 -rc1
Rudi Benkovic JAWmail 1.0
Rudi Benkovic JAWmail 2.0 rc3
Rudi Benkovic JAWmail 2.0 rc2

- 不受影响的程序版本

Rudi Benkovic JAWmail 2.0 rc3
Rudi Benkovic JAWmail 2.0 rc2

- 漏洞讨论

Problems with JAWMail could make it possible to execute arbitrary script code in a vulnerable client.

JAWMail does not sufficiently filter malicious HTML code from e-mails. As a result, when a user opens an email in JAWMail that contains malicious HTML code, the code contained in the mail would be executed in the browser of the mail user.

- 漏洞利用

Ulf Harnhammar &lt;ulfh@update.uu.se&gt; has provided the following proof-of-concept information:

&lt;b onMouseOver="alert(document.cookie)"&gt;bolder&lt;/b&gt;

- 解决方案

Fixes are available. Users are urged to download and install the newest version of JAWmail:


Rudi Benkovic JAWmail 1.0

Rudi Benkovic JAWmail 1.0 -rc1

Rudi Benkovic JAWmail 1.0.1

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站