| VID |
21337 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The SquirrelMail package installed on the Web server, according to its version number, has a Cross-Site Scripting Vulnerability in 'from' E-Mail header. SquirrelMail is a Web mail system written in PHP4. Squirrelmail 1.2.10 and earlier are vulnerable to a Cross-Site Scripting Vulnerability, caused by a failure of the application to properly sanitize user-supplied E-Mail header strings. By creating a specially crafted E-Mail containing malicious code in 'From' header lines and persuading the target user to view it, a remote attacker could cause the code to be executed in the target's Web browser, once the message is viewed. An attacker could use this vulnerability to steal the target's cookie-based authentication credentials.
* Note: This check solely relied on the version number of the remote SquirrelMail to assess this vulnerability, so this might be a false positive.
* References: http://securitytracker.com/alerts/2004/May/1010341.html
* Platforms Affected: SquirrelMail Project Team, SquirrelMail 1.2.10 and earlier Unix Any version Linux Any version |
| Recommendation |
Upgrade to the latest version of SquirrelMail (1.4.3 or later), available from the SquirrelMail Download web site at http://www.squirrelmail.org/download.php |
| Related URL |
CVE-2004-0639 (CVE) |
| Related URL |
10450 (SecurityFocus) |
| Related URL |
16285 (ISS) |
|