[原文]mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.
MailPost is reported prone to a cross-site scripting vulnerability. This issue presents itself due to insufficient sanitization of user-supplied data and can allow an attacker to execute arbitrary HTML and script code in a user's browser through a malicious error message returned from the application.
This attack would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
MailPost 5.1.1sv is reported prone to this issue. It is possible that other versions are affected as well.
MailPost contains a flaw that may lead to an unauthorized information disclosure. The issue is due to the 'mailpost.exe' script not properly sanitizing user-supplied input. By adding a trailing slash to a requested filename, the error page will disclose the installation path resulting in a loss of confidentiality.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.