navigation bar left navigation bar right

Secunia CSI7
navigation left tab Advisories navigation right tab
navigation left tab Research navigation right tab
navigation left tab Forums navigation right tab
navigation left tab Create Profile navigation right tab
navigation left tab Our Commitment navigation right tab
PSI
PSI API
CSI
OSI
xSI
Vulnerabilities
Programs
Open Discussions
My Threads
Create Thread
Statistics
About

Forum Thread: MailMarshal SQM Component Script Insertion Vulnerability

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
MailMarshal SQM Component Script Insertion Vulnerability

Secunia MailMarshal SQM Component Script Insertion Vulnerability
Secunia Official 12th Mar, 2010 14:16
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A vulnerability has been reported in MailMarshal SMTP, which can be exploited by malicious users to conduct script insertion attacks.

Input passed via unspecified parameters in the "list of blocked senders" and "list of safe senders" functionality of the Spam Quarantine Management (SQM) component is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed.

Successful exploitation requires valid user credentials.

NOTE: Reportedly, this vulnerability can further be exploited to install arbitrary files on a victim's system.

The vulnerability is reported in versions 6.0 through 6.3.

vmarian RE: MailMarshal SQM Component Script Insertion Vulnerability
Member 12th Mar, 2010 14:16
Score: 6
Posts: 8
User Since: 11th Mar 2010
System Score: N/A
Location: IE
Last edited on 12th Mar, 2010 14:16

CVE-2008-2831 on SecurityFocus:
http://www.securityfocus.com/bid/31483

CVE-2008-2831 on ventuneac.net:
http://www.ventuneac.net/security-advisories/MVSA-...
Was this reply relevant?
+1
-0


 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 MSSP
Technology Partners
References
 Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


Secunia is a member of FIRST Secunia is a member of EDUcause Secunia is a member of The Open Group Secunia is a member of FS-ISAC
 
Secunia © 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability - Disclaimer
follow Secunia on Facebook follow Secunia on Twitter follow Secunia on LinkedIn follow Secunia on YouTube follow Secunia Xing follow Secunias RSS feed follow Secunia on Google+