0day.today - Biggest Exploit Database in the World.
Things you should know about 0day.today:
Administration of this site uses the official contacts. Beware of impostors!
- We use one main domain: http://0day.today
- Most of the materials is completely FREE
- If you want to purchase the exploit / get V.I.P. access or pay for any other service,
you need to buy or earn GOLD
Administration of this site uses the official contacts. Beware of impostors!
We DO NOT use Telegram or any messengers / social networks!
Please, beware of scammers!
Please, beware of scammers!
- Read the [ agreement ]
- Read the [ Submit ] rules
- Visit the [ faq ] page
- [ Register ] profile
- Get [ GOLD ]
- If you want to [ sell ]
- If you want to [ buy ]
- If you lost [ Account ]
- Any questions [ admin@0day.today ]
- Authorisation page
- Registration page
- Restore account page
- FAQ page
- Contacts page
- Publishing rules
- Agreement page
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
You can contact us by:
Mail:
Facebook:
Twitter:
Telegram:
We DO NOT use Telegram or any messengers / social networks!
SmarterMail 7.3 and 7.4 Multiple Vulnerabilities
Vendor: SmarterTools Application: SmarterMail 7.x Bug(s): Stored XSS, Reflected XSS, Directory Traversal, File Upload Parameters, OS Execution, XML Injection, LDAP Injection, DoS Patch: The Vendor has released SmarterMail Version 8 at URI http://www.smartertools.com/Download.aspx?Product=SmarterMail&File=Installer&Version=8&Location=Primary Timeline: Notify Vendor 10-28-2011 on Version 7.3 with respect to Stored XSS, other Vulns Vendor updates to Version 7.4 on 12.30.2010, Notify Vendor of Stored XSS, other Vulns Vendor updates to Version 8.0 on 3.10.2011 Publication: March 10, 2011 | Hoyt LLC Research publishes vulnerability information for SmarterMail Version 7.3 and 7.4, building on Version 7.1 and 7.2 exploits known as CVE-2010-3486 and CVE-2010-3425 at URI http://www.cloudscan.me/2011/03/smartermail-73-74-full-disclosure-xss.html. Hoyt LLC Research | March 10, 2011 SmarterMail Versions 7.x | CWE-79: The software does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users. Stored XSS - CWE-79, CAPEC-86 - SmarterMail Version 7.x Series Summary Severity: High Confidence: Certain Host: http://SmarterMail 7.x.Hosts Path: /Main/frmPopupContactsList.aspx Issue detail - Confirmed in Versions 7.1, 7.2, 7.3 and 7.4 The value of the ctl00%24MPH%24wucContactInfo%24txtEmailAddress_SettingText request parameter submitted to the URL /Main/frmContact.aspx is copied into the HTML document as plain text between tags at the URL /Main/frmPopupContactsList.aspx. The payload 9e8e5<script>alert(1)</script>5b211c9e81 was submitted in the ctl00%24MPH%24wucContactInfo%24txtEmailAddress_SettingText parameter. This input was returned unmodified in a subsequent request for the URL /Main/frmPopupContactsList.aspx. Full Disclsoure - SmarterMail 7.x - Blog Posts http://www.cloudscan.me/2011/03/smartermail-73-74-full-disclosure-xss.html http://www.cloudscan.me/2010/09/smartermail-7x-713876-bugs-cross-site.html http://www.cloudscan.me/2010/09/smarter-mail-7x-713876-file-fuzzing.html http://www.cloudscan.me/2010/10/vendor-smartertoolscom-smartermail-7x_07.html http://www.cloudscan.me/2010/10/vendor-smartertoolscom-smartermail-7x.html http://www.cloudscan.me/2010/10/smartermail-7x-723925.html Full Disclosure- SmarterMail 7.x - Burp Suite Pro 1.3.08 + Netsparker Audit Reports, HTML, XML Files, Screen Grabs. http://xss.cx/examples/sm_7.2.3925_interim_report_1.htm http://xss.cx/examples/sm_7.2.3925_interim_report_2.htm http://xss.cx/examples/smartermail-7.2-report-interim-3.html http://xss.cx/examples/sm-72-target.html http://xss.cx/examples/sm_7.2.3925_stored_xss_audit_example.html http://xss.cx/examples/sm_7.2.3925_file2_burp_1.3.08.html # 0day.today [2024-11-15] #