Subject: mhonarc: cross-site scripting when converting HTML mails
Package: mhonarc
Version: 2.6.16-1
Severity: important
Tags: security

MHonArc has a cross-site scripting (XSS) security issue when converting HTML
mails with malformed HTML tags of the form "<scr<body>ipt>":

$ mhonarc elsatest.mbox
This is MHonArc v2.6.16, Perl 5.010001 linux
Converting messages to .
Reading elsatest.mbox .

Writing mail .
Writing ./maillist.html ...
Writing ./threads.html ...
Writing database ...
1 new messages
1 total messages
$ cat msg00000.html
<!-- MHonArc v2.6.16 -->
<!--X-Subject: mhonarc test -->

[..]

<!--X-Body-of-Message-->
<script>alert("elsa");</script>


<!--X-Body-of-Message-End-->

[..]

-- System Information:
Debian Release: squeeze/sid
   APT prefers testing
   APT policy: (500, 'testing')
Architecture: i386 (i686)

Kernel: Linux 2.6.32-5-686 (SMP w/1 CPU core)
Locale: LANG=en_US.UTF-8, LC_CTYPE=en_US.UTF-8 (charmap=UTF-8)
Shell: /bin/sh linked to /bin/dash

Versions of packages mhonarc depends on:
ii  perl                          5.10.1-16  Larry Wall's Practical Extraction

Versions of packages mhonarc recommends:
ii  perl [libdigest-md5-perl]     5.10.1-16  Larry Wall's Practical Extraction

mhonarc suggests no packages.

-- no debconf information

-- 
non-customers crew | http://rock-madrid.com/


-- 
_______________________________________________
Surf the Web in a faster, safer and easier way:
Download Opera 9 at http://www.opera.com

Attachment: elsatest.mbox
Description: Binary data

Reply via email to