Vulnerability Note VU#361600
Web-based email services filtering systems vulnerable to malicous script execution
Overview
An attacker can send a specially crafted email message to a victim containing malicious scripting (JavaScript, VBScript, JScript, etc.), or potentially HTML. When a victim views the message with scripting enabled, the victim's browser will then interpret this javascript which can lead to several impacts.
Description
Malicious code provided by one client for another client Sites that provide email service with web interfaces have guarded against a vulnerability where one client embeds malicious HTML tags in a message intended for another client with in the body of a message. For example, an attacker might send an email message like |
Impact
This attack could be used to gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs. This may also lead to the theft of credentials. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Disable scripting in your browser. |
Systems Affected (Learn More)
Vendor | Status | Date Notified | Date Updated |
---|---|---|---|
Hushmail.com | Affected | - | 13 Sep 2001 |
Microsoft Corporation | Affected | - | 13 Sep 2001 |
MyOwnEmail.com | Affected | - | 13 Sep 2001 |
CVSS Metrics (Learn More)
Group | Score | Vector |
---|---|---|
Base | N/A | N/A |
Temporal | N/A | N/A |
Environmental | N/A | N/A |
References
Credit
Hushmail has credited 1; (one-semicolon) with the discovery of this vulnerability.
This document was written by Jason Rafail.
Other Information
- CVE IDs: Unknown
- Date Public: 17 Jan 2002
- Date First Published: 26 Sep 2001
- Date Last Updated: 31 Jul 2002
- Severity Metric: 15.75
- Document Revision: 17
Feedback
If you have feedback, comments, or additional information about this vulnerability, please send us email.