Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
From: Charles Kim (charleskim.usgmail.com)
Date: Wed Jul 25 2007 - 12:13:25 CDT
I have discovered cross-site scripting vulnerability in Mitridat's
Form Processor Pro.
Form Mail: Email Form Processor Pro™ - process all forms on your website
Form Mail: Email Form Processor Pro is the most powerful script to
process forms on your website. The script is available in
PHP, Perl and ASP versions. No programming knowledge needed to install
this script and configure your forms to work with it.
One script can handle unlimited amount of any sophisticated forms. You
have full layout and design control. The script is
* auto responder;
* "preview" and "thank you" pages;
* supports attachments, calculations, "if" condition, variable
field validations, html emails;
* supports multiple pages forms, database data storing and much
Operating system and software installed.
-Form Mail: eMail Form Processor Pro (c) 2000-2003 MitriDAT
-The date stamp for this product is year 2000-2003.
-Mitridat's customer demo on their website has the same date stamp.
How the vulnerability can be reproduced
-A HTTP POST to the following parameters with either an IFRAME or SCRIPT tag.
What impact the vulnerability has on the vulnerable system?
By enticing a user to click on a crafted url, an attacker can execute
arbitrary script code on the victim's browser.
Any additional details that might help in the verification process.
This initial discovery was on a customer running Mitridat's Form
Processor Pro. I was then able to verify the parameter by looking up
Mitridat's website and verifying the xss from their public demo.
Mitridat has demo's of the Form Processor Pro for public view.
Here are tested POSTs I've done on Mitridat's public internet demo's.
Charles H Kim