Vulnerabilities > CVE-2004-1101 - Cross-Site Scripting vulnerability in Tips Mailpost 5.1.1Sv

047910
CVSS 5.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
NONE
Availability impact
PARTIAL
network
tips
nessus
exploit available

Summary

mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.

Vulnerable Configurations

Part Description Count
Application
Tips
1

Exploit-Db

descriptionTIPS MailPost 5.1.1 Error Message Cross-Site Scripting Vulnerability. CVE-2004-1101. Webapps exploit for cgi platform
idEDB-ID:24722
last seen2016-02-02
modified2004-11-03
published2004-11-03
reporterProcheckup
sourcehttps://www.exploit-db.com/download/24722/
titleTIPS MailPost 5.1.1 Error Message Cross-Site Scripting Vulnerability

Nessus

NASL familyCGI abuses : XSS
NASL idMAILPOST_MULTIPLE_FLAWS.NASL
descriptionTIPS MailPost, a web application used for emailing HTML form data to a third party, is installed on the remote host. The version of MailPost hosted on the remote web server has a cross-site scripting vulnerability in the
last seen2020-06-01
modified2020-06-02
plugin id15626
published2004-11-04
reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/15626
titleTIPS MailPost append Parameter XSS