InMail inmail.pl cross site scripting 1.0
 
Plugin ID317
Plugin nameInMail inmail.pl cross site scripting
Plugin filenameInMail inmail.pl cross site scripting.plugin
Plugin filesize2497 bytes
Plugin familyCGI
Plugin created nameMarc Ruef
Plugin created emailmarc.ruef at computec.ch
Plugin created webhttp://www.computec.ch
Plugin created companycomputec.ch
Plugin created date2005/01/05
Plugin version1.0
Plugin protocoltcp
Plugin port80
Plugin procedure exploitopen|send GET /inmail.pl?acao=<script>atk</script> HTTP/1.0\n\n|sleep|close|pattern_exists HTTP/#.# 200 *<script>atk</script>*
Plugin exploit accuracy98
Plugin commentThe NASL script is Copyright (C) 2004 Tenable Network Security
Bug published nameCarlos Ulver
Bug affectedInMail
Bug vulnerability classCross Site Scripting
Bug descriptionThe remote host is using InMail/InShop, a web applications written in Perl. An implementation error in the validation of the user input specifically in the script 'inmail.pl' in its 'acao' uri-argument and 'inshop.pl' in its 'screen' uri argument lead to an XSS vulnerability allowing a user to create cross site attacks, also allowing theft of cookie-based authentication credentials.
Bug solutionNone at this time.
Bug fixing timeApprox. 20 minutes
Bug exploit availabilityYes
Bug exploit urlhttp://www.securityfocus.com/bid/11758/exploit/
Bug remoteYes
Bug localYes
Bug severityMedium
Bug popularity6
Bug simplicity8
Bug impact7
Bug risk7
Bug Nessus riskMedium
Bug check toolsNessus can check this flaw with the plugin 15864 (InMail/InShop XSS).
Source SecurityFocus BID11758
Source OSVDB ID11704
Source Nessus ID15864
Source LiteratureHacking Exposed: Network Security Secrets & Solutions, Stuart McClure, Joel Scambray and George Kurtz, February 25, 2003, 4th Edition, McGraw-Hill Osborne Media, ISBN 0072227427
Source Misc.http://www.computec.ch

This file was generated by the Attack Tool Kit (ATK), the open-sourced security scanner and exploiting framework.