An HTML injection vulnerability is reported in Sympa. The problem occurs due to a failure of the application to properly sanitize user-supplied input data.
Unsuspecting users viewing the affected page will have attacker-supplied malicious code interpreted by their browser in the security context of the website hosting Sympa.
Attackers may potentially exploit this issue to manipulate web content or to steal cookie-based authentication credentials. It may be possible to take arbitrary actions as the victim user.
Versions 4.1, and all 4.1.x releases are reported vulnerable to this issue.
Whatever_you_want<script>alert("Your cookie is " + document.cookie)</script>
Sympa contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate description fields input upon submission to the admin script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Upgrade to version 4.2b.3 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.