Alert! SpamTitan Users at Risk From Cross-site Scripting Vulnerability

June 27, 2014 | By Kevin Judge
1 Star2 Stars3 Stars4 Stars5 Stars

hacker in monitorAccording to Homeland Securities Computer Emergency Response Team (US-CERT) SpamTitan contains a reflected cross-site scripting (XSS) vulnerability. SpamTitan is a server system for monitoring email and reducing spam email and other threats.

The vulnerability was found in the auth-settings-x.php page of the management interface. It will enable an attacker to load a malicious script in the context of the user’s browser through thesortdir parameter.

Cross-Site Scripting vulnerabilities allow a third party to manipulate the content or behaviour of a web application in a user’s browser, without compromising the underlying system. Cross-Site Scripting vulnerabilities are often used against specific users of a website to steal their credentials or to conduct spoofing attacks.

SpamTitan customers should apply patch 6.04, release recently by SpamTitan to address this vulnerability.

You should only allow connections from trusted hosts and networks. Restricting access does not prevent XSS or CSRF attacks since the attack comes as an HTTP request from a legitimate user’s host. However, restricting access would prevent an attacker from accessing the web interface using stolen credentials.

Be Sociable, Share!

    Add new comment

    Your name

    You may use these HTML tags and attributes: <abbr title=""> <acronym title=""> <b> <blockquote cite=""> <cite> <code> <del datetime=""> <em> <i> <q cite=""> <strike> <strong>


    What Hidden Threats LurkOn Your Endpoints?

    Get complete security from known and unknown threats from Comodo Endpoint Protection

    free threat scan

    How Secure is your network against Internet-based Attacks?

    Take the instant Network Security Assessment to get your security score!

    test my security now