====================================================================== Secunia Research 06/09/2005 - SqWebMail Conditional Comments Script Insertion Vulnerability - ====================================================================== Table of Contents Affected Software....................................................1 Severity.............................................................2 Description of Vulnerability.........................................3 Solution.............................................................4 Time Table...........................................................5 Credits..............................................................6 References...........................................................7 About Secunia........................................................8 Verification.........................................................9 ====================================================================== 1) Affected Software SqWebMail 5.0.4 Prior versions may also be affected. ====================================================================== 2) Severity Rating: Moderately Critical Impact: Script Insertion Where: From Remote ====================================================================== 3) Description of Vulnerability Secunia Research has discovered a vulnerability in SqWebMail, which can be exploited by malicious people to conduct script insertion attacks. The vulnerability is caused due to SqWebMail allowing usage of e.g. the "<script>" tag within an HTML comment. This, combined with "Conditional Comments" in Internet Explorer, can be exploited to execute arbitrary script code in a user's browser session in context of a vulnerable site when a malicious email is viewed. Successful exploitation requires that the user is using Internet Explorer. Example in an HTML email: <!--[if IE]> <script>alert("Vulnerable!");</script> <![endif]--> ====================================================================== 4) Solution The vendor has issued an updated version of SqWebMail, which fixes this vulnerability. http://www.courier-mta.org/?download.php ====================================================================== 5) Time Table 05/09/2005 - Initial vendor notification. 05/09/2005 - Vendor confirms vulnerability and releases a fix. 06/09/2005 - Public disclosure. ====================================================================== 6) Credits Discovered by Jakob Balle, Secunia Research. ====================================================================== 7) References No references available. ====================================================================== 8) About Secunia Secunia collects, validates, assesses, and writes advisories regarding all the latest software vulnerabilities disclosed to the public. These advisories are gathered in a publicly available database at the Secunia website: http://secunia.com/ Secunia offers services to our customers enabling them to receive all relevant vulnerability information to their specific system configuration. Secunia offers a FREE mailing list called Secunia Security Advisories: http://secunia.com/secunia_security_advisories/ ====================================================================== 9) Verification Please verify this advisory by visiting the Secunia website: http://secunia.com/secunia_research/2005-44/advisory/ Complete list of vulnerability reports published by Secunia Research: http://secunia.com/secunia_research/ ======================================================================