intitle:"EMUMAIL - Login" "Powered by EMU Webmail"

GHDB-ID:

560

Author:

anonymous

Google Dork Description:

intitle:"EMUMAIL - Login" "Powered by EMU Webmail"

The failure to strip script tags in emumail.cgi allows for XSS type of attack. Vulnerable systems: * EMU Webmail version 5.0 * EMU Webmail version 5.1.0 Depending on what functions you throw in there, you get certain contents of the emumail.cgi file. The vulnerability was discovered in an obsolete script named userstat.pl shipped with Open Webmail. The script doesn't properly filter out shell characters from the loginname parameter. http://www.securityfocus.com/bid/9861