#VU44366 Cross-site scripting in MailEnable - CVE-2012-0389
Published: January 24, 2012 / Updated: August 11, 2020
MailEnable
MailEnable Pty. Ltd.
Description
Vulnerability allows a remote attacker to perform Cross-site scripting attacks.
An input validation error exists in ForgottenPassword.aspx in MailEnable Professional, Enterprise, and Premium 4.26 and earlier, 5.x before 5.53, and 6.x before 6.03 when processing Username parameter. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
External links
- http://archives.neohapsis.com/archives/bugtraq/2012-01/0090.html
- http://osvdb.org/78242
- http://secunia.com/advisories/47518
- http://secunia.com/advisories/47562
- http://www.exploit-db.com/exploits/18447
- http://www.mailenable.com/kb/Content/Article.asp?ID=me020567
- http://www.nerv.fi/CVE-2012-0389.txt
- http://www.securityfocus.com/bid/51401
- http://www.securitytracker.com/id?1026519
- https://exchange.xforce.ibmcloud.com/vulnerabilities/72380