Vulnerability Note VU#361600
Web-based email services filtering systems vulnerable to malicous script execution
Malicious code provided by one client for another client
Sites that provide email service with web interfaces have guarded against a vulnerability where one client embeds malicious HTML tags in a message intended for another client with in the body of a message. For example, an attacker might send an email message like
This attack could be used to gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs. This may also lead to the theft of credentials.
The CERT/CC is currently unaware of a practical solution to this problem.
Disable scripting in your browser.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Hushmail.com||Affected||-||13 Sep 2001|
|Microsoft Corporation||Affected||-||13 Sep 2001|
|MyOwnEmail.com||Affected||-||13 Sep 2001|
CVSS Metrics (Learn More)
Hushmail has credited 1; (one-semicolon) with the discovery of this vulnerability.
This document was written by Jason Rafail.
- CVE IDs: Unknown
- Date Public: 17 Jan 2002
- Date First Published: 26 Sep 2001
- Date Last Updated: 31 Jul 2002
- Severity Metric: 15.75
- Document Revision: 17
If you have feedback, comments, or additional information about this vulnerability, please send us email.