Description
|
|
Multiple vulnerabilities were identified in AMAX Winmail Server, which could be exploited by attackers to overwrite arbitrary files or conduct cross site scripting.
The first flaw is due to an input validation error in the "admin/main.php" script that does not properly validate the "sid" parameter, which could be exploited to overwrite arbitrary files with session information via directory traversal attacks.
The second issue is due to an input validation error in the "badlogin.php" script when processing a specially crafted "retid" parameter, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The third vulnerability is due to an error when processing javascript code embedded in the body and the "Content-Type" header of incoming HTML emails, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
The fourth problem is due to an error where attachments of incoming emails are opened insecurely in the browser, which may be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser.
|