Information Security all in one place!

MailEnable webmail cross-site scripting vulnerability

Vulnerability description: CVE-2012-0389

Discovered by: Sajjad Pourali, Narendra Shinde and Shahab NamaziKhah

MailEnable <> Professional and Enterprise versions are prone to cross-site scripting vulnerabilities as the user-supplied input received via “Username” parameter of “ForgottonPassword.aspx” page is not properly sanitized. A specially crafted URL which a user clicks could gain access to the users cookies for webmail or execute other malicious code in users browser in context of the domain in use.

Remote: yes
Authentication required: no
User interactionrequired: yes

Cross-site scripting: a cookie that should be ...

Image via Wikipedia


– MailEnable Professional, Enterprise & Premium 4.26 and earlier
– MailEnable Professional, Enterprise & Premium 5.52 and earlier
– MailEnable Professional, Enterprise & Premium 6.02 and earlier

Not affected:

– MailEnable Standard is not affected.



Users of MailEnable 5 and 6 can resolve the issue by upgrading to version 5.53 or 6.03 or later. Alternatively, and for version 4 users, the following fix can be applied:

1) Open the ForgottenPassword.aspx file in Notepad. This file is in the Mail Enable\bin\NETWebMail\Mondo\lang\[language] folders in version 4 and in Mail Enable\bin\NETWebMail\Mondo\lang\sys in version 5 and 6.
2) Locate and remove the following line, then save the file: document.getElementById(“txtUsername”).value = ‘<%= Request.Item(“Username”) %>’;

– Henri Salo


Let's hear what you have to say.

Fill in your details below or click an icon to log in: Logo

You are commenting using your account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s