[原文]Cross-site scripting (XSS) vulnerability in AMAX Magic Winmail Server 4.2 (build 0824) and earlier allows remote attackers to inject arbitrary web script or HTML via the (1) retid parameter in badlogin.php, (2) Content-Type headers in HTML mails, and (3) HTML mail attachments.
Winmail Mail Server contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate "retid" variables upon submission to the badlogin.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.
Currently, there are no known upgrades, patches, or workarounds available to correct this issue.
Secunia Research is credited with the discovery of these vulnerabilities.
AMAX Information Technologies Inc. Magic Winmail Server 4.2 (Build 0824)
Magic Winmail Server is prone to multiple input validation vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input.
Magic Winmail Server is prone to cross-site scripting, HTML injection and directory traversal vulnerabilities.
No exploit is required.
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: firstname.lastname@example.org <mailto:email@example.com>.