Forum Thread: MailMarshal SQM Component Script Insertion Vulnerability

You are currently viewing a forum thread in the Secunia Community Forum. Please note that opinions expressed here are not of Secunia but solely reflect those of the user who wrote it.

This thread was submitted in the following forum:
Vulnerabilities

See the original Secunia advisory:
MailMarshal SQM Component Script Insertion Vulnerability

Secunia MailMarshal SQM Component Script Insertion Vulnerability
Secunia Official 12th Mar, 2010 14:16
Ranking: 0
Posts: 0
User Since: -
System Score: -
Location: Copenhagen, DK
A vulnerability has been reported in MailMarshal SMTP, which can be exploited by malicious users to conduct script insertion attacks.

Input passed via unspecified parameters in the "list of blocked senders" and "list of safe senders" functionality of the Spam Quarantine Management (SQM) component is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed.

Successful exploitation requires valid user credentials.

NOTE: Reportedly, this vulnerability can further be exploited to install arbitrary files on a victim's system.

The vulnerability is reported in versions 6.0 through 6.3.

vmarian RE: MailMarshal SQM Component Script Insertion Vulnerability
Member 12th Mar, 2010 14:16
Score: 6
Posts: 8
User Since: 11th Mar 2010
System Score: N/A
Location: IE
Last edited on 12th Mar, 2010 14:16

CVE-2008-2831 on SecurityFocus:
http://www.securityfocus.com/bid/31483

CVE-2008-2831 on ventuneac.net:
http://www.ventuneac.net/security-advisories/MVSA-...
Was this reply relevant?
+1
-0