CVE-2004-1101

Tips Mailpost - XSS

Title source: rule
STIX 2.1

Description

mailpost.exe in MailPost 5.1.1sv, and possibly earlier versions, allows remote attackers to cause a denial of service (server crash), leak sensitive pathname information in the resulting error message, and execute a cross-site scripting (XSS) attack via an HTTP request that contains a / (backslash) and arbitrary webscript before the requested file, which leaks the pathname and does not quote the script in the resulting Visual Basic error message.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Procheckup · textwebappscgi
https://www.exploit-db.com/exploits/24722

References (4)

Core 4
Core References
Exploit, Vendor Advisory vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/11598
Third Party Advisory, US Government Resource third-party-advisory x_refsource_cert-vn
http://www.kb.cert.org/vuls/id/596046
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/17951

Scores

EPSS 0.0270
EPSS Percentile 85.9%

Details

Status published
Products (1)
tips/mailpost 5.1.1_sv
Published Jan 10, 2005
Tracked Since Feb 18, 2026