Overview
A cross-site scripting vulnerability in Microsoft Exchange 5.5 Outlook Web Access (OWA) could allow an attacker to execute arbitrary scripting code in the victim's browser.
Description
Outlook Web Access (OWA) is a component of Microsoft Exchange. By using OWA, a server that is running Exchange Server can also function as a website that lets authorized users read or send email messages, manage their calendar, or perform other mail functions over the Internet by using a web browser. A cross-site scripting vulnerability exists in the way OWA validates user input provided to an HTML redirection query. By convincing a user to click on a specially crafted URL within an email message, an attacker could cause arbitrary scripting code to be executed in the victim's browser. If executed, the script would have all privileges of the OWA user, including access to and manipulation of messages and folders on the server. |
Impact
If an attacker can convince a user to follow a link, the attacker could execute script as the victim in the context of the zone in which the Outlook Web Access server resides. For example, this could permit the attacker to gain access to messages stored on the server. |
Solution
Apply patch Apply a patch as described in Microsoft Security Bulletin MS04-026. |
|
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
This vulnerability was reported by Microsoft.
This document was written by Damon Morda based on information provided by Microsoft.
Other Information
CVE IDs: | CVE-2004-0203 |
Severity Metric: | 2.43 |
Date Public: | 2004-08-10 |
Date First Published: | 2004-08-11 |
Date Last Updated: | 2004-08-11 12:57 UTC |
Document Revision: | 26 |