Overview
An attacker can send a specially crafted email message to a victim containing malicious scripting (JavaScript, VBScript, JScript, etc.), or potentially HTML. When a victim views the message with scripting enabled, the victim's browser will then interpret this javascript which can lead to several impacts.
Description
Malicious code provided by one client for another client Sites that provide email service with web interfaces have guarded against a vulnerability where one client embeds malicious HTML tags in a message intended for another client with in the body of a message. For example, an attacker might send an email message like |
Impact
This attack could be used to gain sensitive data such as passwords, credit card numbers, and any arbitrary information the user inputs. This may also lead to the theft of credentials. |
Solution
The CERT/CC is currently unaware of a practical solution to this problem. |
Disable scripting in your browser. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Hushmail has credited 1; (one-semicolon) with the discovery of this vulnerability.
This document was written by Jason Rafail.
Other Information
CVE IDs: | CVE-2001-0223 |
Severity Metric: | 15.75 |
Date Public: | 2002-01-17 |
Date First Published: | 2001-09-26 |
Date Last Updated: | 2002-07-31 17:56 UTC |
Document Revision: | 17 |