The "/cgi-bin/go" page in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via ACTION parameter without authentication. The code can executed for any user accessing the page. This vulnerability affects many mail system of governments, organizations, companies and universities.
The injection point is ACTION parameter in "/cgi-bin/go".
We can execute arbitrary code without authentication.
http://[Target Domain]
/cgi-bin/go
- Tony Kuo (CHT Security)
- Vtim (CHT Security)