I. VULNERABILITY ------------------------- Multiplus XSS in Proxmox Mail Gateway 3.1 II. BACKGROUND ------------------------- Proxmox Mail Gateway helps you protect your business against all email threats like spam, viruses, phishing and trojans at the moment they emerge. The flexible architecture combined with the userfriendly, III. DESCRIPTION ------------------------- Has been detected a XSS Reflected via GET and Store XSS via POST vulnerability in Promox Mail Gateway in "/objects/who/index.htm?state=" parameter "state" and input User (E-mail address) in /quarantine/spam/manage.htm that allows the execution of arbitrary HTML/script code to be executed in the context of the victim user's browser and/or Session Hijacking attack IV. PROOF OF CONCEPT ------------------------- The application does not validate the parameter filter in https://IP/objects/who/index.htm?itemid=1&gid=2&state= '>aaaaa V. BUSINESS IMPACT ------------------------- That allows the execution attackers tohijack the authentication of administrators. VI. REQUIREMENTS ----------------------- An Attacker needs to know the IP of the device. An Administrator needs an authenticated connection to the device. VII. SYSTEMS AFFECTED ------------------------- Try Proxmox Mail Gateway 3.1 VIII. SOLUTION ------------------------- All parameter must be validated. Fix http://proxmox.com/news/archive/view/listid-1-proxmox-newsletter/mailid-48-proxmox-newsletter-march-2014-proxmox-ve-3-2-released/tmpl-component By William Costa