Description
Multiple cross-site scripting (XSS) vulnerabilities in the Web Administrator in Websense Personal Email Manager 7.1 before Hotfix 4 and Email Security 7.1 before Hotfix 4 allow remote attackers to inject arbitrary web script or HTML via the (1) FileName, (2) IsolatedMessageID, (3) ServerName, (4) Dictionary, (5) Scoring, and (6) MessagePart parameters to web/msgList/viewmsg/actions/msgAnalyse.asp; the (7) Queue, (8) FileName, (9) IsolatedMessageID, and (10) ServerName parameters to actions/msgForwardToRiskFilter.asp and viewHeaders.asp in web/msgList/viewmsg/; and (11) the subject in an e-mail message that is held in a Queue.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Nikolas Sotiriu · textwebappshardware
https://www.exploit-db.com/exploits/9981
References (6)
Core 6
Core References
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/507330/100/0/threaded
Exploit x_refsource_misc
http://sotiriu.de/adv/NSOADV-2009-003.txt
Exploit vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/36741
Various Sources x_refsource_confirm
http://kb.websense.com/display/4/kb/article.aspx?aid=4786
Patch, Vendor Advisory vdb-entry
x_refsource_vupen
http://www.vupen.com/english/advisories/2009/2987
Vendor Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/37091
Scores
EPSS
0.0438
EPSS Percentile
89.0%
Details
CWE
CWE-79
Status
published
Products (2)
websense/personal_email_manager
7.1
websense/websense_email_security
7.1
Published
Oct 22, 2009
Tracked Since
Feb 18, 2026