Release date:
Updated on:
Affected Systems:
Magicwinmail Winmail Server 5.x
Description:
--------------------------------------------------------------------------------
Bugtraq id: 56231
Winmail Server is a secure, easy-to-use, full-featured mail Server software.
Winmail Server 5.0 Build 0620 and other versions have multiple security vulnerabilities that can be exploited to insert attacks.
1) Pass the "monitorname" parameter to the input of admin/main. php (when "dest" is set to "mailmonitor") and the "signname" parameter
If the parameters passed by admin/main. php are not properly filtered, they are displayed to the user. arbitrary HTML and script code can be inserted.
2) If the input passed through the mail subject is incorrectly filtered, it can be used to insert arbitrary HTML and script code.
<* Source: Zhao Liang
Link: http://secunia.com/advisories/50631/
*>
Suggestion:
--------------------------------------------------------------------------------
Vendor patch:
Magicwinmail
------------
The vendor has released a patch to fix this security problem. Please download it from the vendor's homepage:
Http://www.magicwinmail.com/