Outblaze Webmail is reported prone to an-HTML injection vulnerability because the application fails to properly sanitize user-supplied HTML email content.
An attacker may be able to inject HTML and script code into the application through HTML email because it isn't properly sanitized.
An attacker can exploit this issue to access an unsuspecting user's cookie-based authentication credentials and to retrieve personal email. Other attacks are also possible.
ript:alert (document.cookie)";" border="0" height="1" width="1">
Outblaze Web based e-mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate [IMG] tag variables upon submission of emails. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.