Multiple vulnerabilities have been identified in the application that may allow an attacker to carry out cross-site scripting attacks and disclose the path to the victim's home directory. The issues are reported to exist in the login script, 'emumail.fcgi' script and the 'init.emu' sample script.
EMU Webmail 5.2.7 has been reported to be affected by these issues.
EMUMAIL WebMail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the "variable" or "folder" variables upon submission to the "emumail.fcgi" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.