Korean
<< Back
VID 21337
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail package installed on the Web server, according to its version number, has a Cross-Site Scripting Vulnerability in 'from' E-Mail header.
SquirrelMail is a Web mail system written in PHP4. Squirrelmail 1.2.10 and earlier are vulnerable to a Cross-Site Scripting Vulnerability, caused by a failure of the application to properly sanitize user-supplied E-Mail header strings. By creating a specially crafted E-Mail containing malicious code in 'From' header lines and persuading the target user to view it, a remote attacker could cause the code to be executed in the target's Web browser, once the message is viewed. An attacker could use this vulnerability to steal the target's cookie-based authentication credentials.

* Note: This check solely relied on the version number of the remote SquirrelMail to assess this vulnerability, so this might be a false positive.

* References:
http://securitytracker.com/alerts/2004/May/1010341.html

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail 1.2.10 and earlier
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of SquirrelMail (1.4.3 or later), available from the SquirrelMail Download web site at http://www.squirrelmail.org/download.php
Related URL CVE-2004-0639 (CVE)
Related URL 10450 (SecurityFocus)
Related URL 16285 (ISS)