NetWin Surgemail: XSS vulnerability

Users of NetWin Surgemail please be advised of a Cross-site scripting (XSS) vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

NetWin-SA-01/04/2010: NetWin Surgemail XSS vulnerability
Problem

——-

Cross-site scripting (XSS) vulnerability in the Surgemail webmail login page

(/surgemail) allows remote attackers to inject arbitrary web script or HTML.

Input passed to the “username_ex” parameter is not properly sanitised before

being returned to the user, therefore enabling the execution of arbitrary

script code in a user’s browser session, which can lead to cookie theft and

session hijacking.

The vulnerability is confirmed to exist in version 4.3e (latest version at

the date of vulnerability discovery). Previous versions may also be vulnerable.
Read more at http://www.criticalwatch.com