Skip to content

Instantly share code, notes, and snippets.

Show Gist options
  • Star 0 You must be signed in to star a gist
  • Fork 0 You must be signed in to fork a gist
  • Save tonykuo76/5bf1ac369d953d5276afe0a2d04c2147 to your computer and use it in GitHub Desktop.
Save tonykuo76/5bf1ac369d953d5276afe0a2d04c2147 to your computer and use it in GitHub Desktop.
Openfind MAIL2000 Webmail Post-Auth Cross-Site Scripting

Openfind MAIL2000 Webmail Post-Auth Cross-Site Scripting

Current Description

The login feature in "/cgi-bin/portal" in MAIL2000 through version 6.0 and 7.0 has a cross-site scripting (XSS) vulnerability, allowing execution of arbitrary code via any parameter. This vulnerability affects many mail system of governments, organizations, companies and universities.

Details

The injection point is any parameter in "/cgi-bin/portal".

We execute arbitrary code via any paramemer.

Description

The code is executed for a user logining in to the Webmail, whenever login Page is displayed. This may allow the user to steal cookie-based authentication credentials.

Affected files

http://[Target Domain]/cgi-bin/portal

Contributor

  • Tony Kuo (CHT Security)
  • Vtim (CHT Security)
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment