ID CVE-2002-0738
Summary MHonArc 2.5.2 and earlier does not properly filter Javascript from archived e-mail messages, which could allow remote attackers to execute script in web clients by (1) splitting the SCRIPT tag into smaller pieces, (2) including the script in a SRC argument to an IMG tag, or (3) using "&={script}" syntax.
References
Vulnerable Configurations
  • cpe:2.3:a:mhonarc:mhonarc:2.5:*:*:*:*:*:*:*
    cpe:2.3:a:mhonarc:mhonarc:2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:mhonarc:mhonarc:2.5.1:*:*:*:*:*:*:*
    cpe:2.3:a:mhonarc:mhonarc:2.5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:mhonarc:mhonarc:2.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:mhonarc:mhonarc:2.5.2:*:*:*:*:*:*:*
CVSS
Base: 7.5 (as of 05-09-2008 - 20:28)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL PARTIAL PARTIAL
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:P/A:P
refmap via4
bid 4546
bugtraq 20020418 MHonArc v2.5.2 Script Filtering Bypass Vulnerability
confirm http://www.mhonarc.org/MHonArc/CHANGES
debian DSA-163
xf mhonarc-script-filtering-bypass(8894)
Last major update 05-09-2008 - 20:28
Published 12-08-2002 - 04:00
Last modified 05-09-2008 - 20:28
Back to Top