-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 Hi, Horde IMP Webmail Client version H3 (4.1.4) was released a few hours ago. It contains fixes for 2 XSS issues (compared to 4.1.4 RC1). 1. Script injection through email subject lines in threaded view Subject lines of emails, when displayed in vulnerable versions of IMP in 'multiple message view' (IMP core) or with the thread plugin, are not properly sanitized. An email with a custom crafted subject which may then be loaded in the authenticated webmail session of the victim may inject malicious client side scripting code (such as Javascript) or HTML and allow for XSS attacks. Example: Subject: <script>alert('XSS')</script> The issue is found in thread.php. 2. Multiple XSS in search function A victims' web browser, running a previously authenticated IMP session, may be forced into loading a custom crafted URL pointing to the email search function. The payload will cause the client side script code contained in the specially crafted URL to be executed in the security context of the domain the vulnerable copy of IMP is accessed through. This allows for mounting XSS attacks. There were several XSS issues in the search function which have been fixed at the same time. Example: [Base_HREF]/horde/imp/search.php?edit_query=%22%3E%3Cscript%3Ealert%28'XSS'%29%3C/script%3E%3Cx=%22 Credit for discovering both issues and providing a patch for the first one goes to Immerda Project Group http://www.immerda.ch and Moritz Naumann http://moritz-naumann.com The developers' release announcement can be found at: http://lists.horde.org/archives/announce/2007/000316.html General information on this application is available at http://www.horde.org/imp/ Moritz -----BEGIN PGP SIGNATURE----- Version: GnuPG v1.4.6 (GNU/Linux) iD8DBQFF+Jqxn6GkvSd/BgwRAkL9AJ9kpIExrPk2OKfhD+XpGGxK4YQ0OgCfb4bG 8SBYyCJorZCpFALUdzqTUCo= =W/aM -----END PGP SIGNATURE-----