Short Name |
SMTP:SQWEBMAIL-EMAIL-HEADER-INJ |
---|---|
Severity |
Medium |
Recommended |
No |
Category |
SMTP |
Keywords |
SqWebMail Email Header HTML Injection |
Release Date |
2013/05/06 |
Update Number |
2260 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects SMTP messages containing HTML code in SqWebmail. Attackers can send maliciously crafted SMTP messages to execute arbitrary HTML code at the same privilege level as the target.
SqWebMail is reported to be prone to an email header HTML injection vulnerability. This issue presents itself due to a failure of the application to properly sanitize user-supplied email header strings. The problem presents itself when an unsuspecting user views an email message containing malicious HTML and script code in the email header. An attacker can exploit this issue to gain access to an unsuspecting user's cookie based authentication credentials.