Microsoft Exchange Outlook Web Access HTML cross-site scripting
|exchange-owa-html-xss (43329)||Medium Risk|
Microsoft Exchange Server is vulnerable to cross-site scripting in the Outlook Web Access component, caused by improper validation of HTML when rendering email within an OWA session. By persuading a victim to open a specially-crafted email from within Outlook Web Access, a remote attacker could exploit this vulnerability to execute arbitrary script within the security context of victim's session.
Apply the appropriate patch for your system, as listed in the latest Microsoft Security Bulletin. See References.
— OR —
Use Microsoft Automatic Update if it is supported by your operating system. The original bulletin issued by Microsoft has been superseded.
- HP Security Bulletin HPSBST02350 SSRT080102 rev.1: Storage Management Appliance (SMA), Microsoft Patch Applicability MS08-037 to MS08-040.
- Microsoft Security Bulletin MS08-039: Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747).
- Microsoft Security Bulletin MS09-003: Vulnerabilities in Microsoft Exchange Could Allow Remote Code Execution (959239).
- NORTEL BULLETIN ID: 2008008958, Rev 1: Centrex IP Client Manager (CICM) response to Microsoft July security bulletin .
- ASA-2008-290: MS08-039 Vulnerabilities in Outlook Web Access for Exchange Server Could Allow Elevation of Privilege (953747)
- CVE-2008-2248: Cross-site scripting (XSS) vulnerability in Outlook Web Access (OWA) for Exchange Server 2003 SP2 allows remote attackers to inject arbitrary web script or HTML via unspecified HTML, a different vulnerability than CVE-2008-2247.
- SA30964: Microsoft Outlook Web Access Script Insertion Vulnerabilities
- SECTRACK ID: 1020439: Microsoft Outlook Web Access for Exchange Server Input Validation Bugs Permit Cross-Site Scripting Attacks
- HP Storage Management Appliance 2.1
- Microsoft Exchange Server 2003 SP2
- Microsoft Exchange Server 2007 SP1
- Microsoft Exchange Server 2007
Jul 08, 2008
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.