Vigil@nce - MHonArc: Cross Site Scripting of Commentize
May 2014 by Vigil@nce
This bulletin was written by Vigil@nce : http://vigilance.fr/offer
SYNTHESIS OF THE VULNERABILITY
An attacker can trigger a Cross Site Scripting via a comment of
MHonArc, in order to execute JavaScript code in the context of the
web site.
Impacted products: MHonArc
Severity: 2/4
Creation date: 23/04/2014
DESCRIPTION OF THE VULNERABILITY
The MHonArc product uses a web service to display emails.
The commentize() function of the lib/ewhutil.pl file converts
special characters, before injecting them in an HTML comment.
However, the ’<’ character is not filtered.
An attacker can therefore trigger a Cross Site Scripting via a
comment of MHonArc, in order to execute JavaScript code in the
context of the web site.
ACCESS TO THE COMPLETE VIGIL@NCE BULLETIN
http://vigilance.fr/vulnerability/MHonArc-Cross-Site-Scripting-of-Commentize-14632