Description
Multiple cross-site scripting (XSS) vulnerabilities in NetWin (1) SurgeMail before 2.0c and (2) WebMail allow remote attackers to inject arbitrary web script or HTML via (a) a URI containing the script, or (b) the username field in the login form. NOTE: it is possible that the first attack vector is resultant from the error message issue (CVE-2004-2547).
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Donnie Werner · textwebappsphp
https://www.exploit-db.com/exploits/24177
References (7)
Core 7
Core References
Various Sources x_refsource_misc
http://www.netwinsite.com/surgemail/help/updates.htm
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/10483
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/16320
Exploit x_refsource_misc
http://www.exploitlabs.com/files/advisories/EXPL-A-2004-002-surgmail.txt
Exploit vdb-entry
x_refsource_osvdb
http://www.osvdb.org/6746
Exploit, Patch mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2004-06/0056.html
Patch, Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/11772
Scores
EPSS
0.1282
EPSS Percentile
94.1%
Details
Status
published
Products (9)
netwin/surgemail
1.8a
netwin/surgemail
1.8b3
netwin/surgemail
1.8d
netwin/surgemail
1.8f
netwin/surgemail
1.8g3
netwin/surgemail
1.9
netwin/surgemail
1.9b2
netwin/surgemail
< 2.0a2
netwin/webmail
3.1d
Published
Dec 31, 2004
Tracked Since
Feb 18, 2026