Aerosol Posted March 11, 2015 Report Posted March 11, 2015 *SuperWebMailer 5.50.0.01160 XSS (Cross-site Scripting) SecurityVulnerabilities*Exploit Title: SuperWebMailer /defaultnewsletter.php" HTMLForm ParameterXSS Security VulnerabilitiesProduct: SuperWebMailerVendor: SuperWebMailerVulnerable Versions: 5.*.0.* 4.*.0.*Tested Version: 5.*.0.* 4.*.0.*Advisory Publication: March 10, 2015Latest Update: March 10, 2015Vulnerability Type: Cross-Site Scripting [CWE-79]CVE Reference: *Impact CVSS Severity (version 2.0):CVSS v2 Base Score: 4.3 (MEDIUM) (AV:N/AC:M/Au:N/C:N/I:P/A:N) (legend)Impact Subscore: 2.9Exploitability Subscore: 8.6Credit: Wang Jing [Mathematics, Nanyang Technological University (NTU),Singapore]*Advisory Details:**(1) Vendor & Product Description:**Vendor:*SuperWebMailer*Product & Vulnerable Versions:*SuperWebMailer5.60.0.011905.50.0.011605.40.0.011455.30.0.011235.20.0.011135.10.0.009825.05.0.009705.02.0.009655.00.0.009624.50.0.009304.40.0.009174.31.0.009144.30.0.009074.20.0.008924.10.0.00875*Vendor URL & Download:*SuperWebMailer can be got from here,http://www.superwebmailer.de/*Product Introduction:*"Super webmail is a web-based PHP Newsletter Software. The web-based PHPNewsletter Software Super webmail is the optimal solution for theimplementation of a successful e-mail marketing.""To use the online PHP Newsletter Script is your own website / server withPHP 4 or newer, MySQL 3.23 or later and the execution of CronJobs required.Once installed, the online newsletter software Super webmail can be serveddirectly in the browser. The PHP Newsletter Tool Super webmail cantherefore be used platform-independent all operating systems such asWindows, Linux, Apple Macintosh, with Internet access worldwide. The PHPNewsletter Script allows you to manage your newsletter recipients includingregistration and deregistration from the newsletter mailing list bydouble-opt In, Double Opt-Out and automatic bounce management. Send onlineyour personalized newsletter / e-mails in HTML and Text format withembedded images and attachments immediately in the browser or by CronJobscript in the background immediately or at a later. With the integratedtracking function to monitor the success of the newsletter mailing, ifthereby the openings of the newsletter and clicks on links in thenewsletter graphically evaluated and presented. Put the integratedautoresponder to autorun absence messages or the receipt of e-mails toconfirm.""It is now included CKEditor 4.4.7. An upgrade to the latest version isrecommended as an in CKEditor 4.4.5 Vulnerability found. Super webmail fromimmediately contains new chart component for the statistics that do notneed a flash and are therefore also represented on Apple devices. For theNewsletter tracking statistics is now an easy print version of the chartsavailable that can be printed or saved with PDF printer driver installed ina PDF file. When viewing the e-mails in the mailing lists of the sender ofthe email is displayed in a column that sent the e-mail to the mailinglist. For form creation for the newsletter subscription / cancellation arenow available variant"*(2) Vulnerability Details:*SuperWebMailer web application has a security bug problem. It can beexploited by XSS attacks. This may allow a remote attacker to create aspecially crafted request that would execute arbitrary script code in auser's browser session within the trust relationship between their browserand the server. Other bug hunter researchers have found other XSSvulnerabilities related to it before and SuperWebMailer has patched them.*(2.1) *The code programming flaw occurs at "defaultnewsletter.php" pagewith "&HTMLForm" parameters.*References:*http://tetraph.com/security/xss-vulnerability/superwebmailer-5-50-0-01160-xss-cross-site-scripting-security-vulnerabilities/http://securityrelated.blogspot.com/2015/03/superwebmailer-550001160-xss-cross-site.htmlhttp://www.inzeed.com/kaleidoscope/computer-web-security/superwebmailer-5-50-0-01160-xss-cross-site-scripting-security-vulnerabilities/http://diebiyi.com/articles/%E5%AE%89%E5%85%A8/superwebmailer-5-50-0-01160-xss-cross-site-scripting-security-vulnerabilities/https://webtechwire.wordpress.com/2015/03/10/superwebmailer-5-50-0-01160-xss-cross-site-scripting-security-vulnerabilities/http://static-173-79-223-25.washdc.fios.verizon.net/?l=full-disclosure&m=142551542201539&w=2https://cxsecurity.com/issue/WLB-2015030043--Wang Jing,Division of Mathematical Sciences (MAS),School of Physical and Mathematical Sciences (SPMS),Nanyang Technological University (NTU),Singapore.http://www.tetraph.com/wangjing/https://twitter.com/tetraphibiousSource Quote