Korean
<< Back
VID 21338
Severity 40
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail package installed on the Web server, according to its version number, has multiple Vulnerabilities.
SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions prior to 1.4.3 are vulnerable to the following multiple vulnerabilities:

- Folder Name Cross-Site Scripting Vulnerability (CAN-2004-0519)
- Email Header HTML Injection Vulnerability (CAN-2004-0520)
- SQL Injection Vulnerability (CAN-2004-0521)

These issues are caused by a failure of the application to properly sanitize user-supplied input data. A remote attacker could use these vulnerabilities to add, modify or delete user information in the backend database, or to steal the session cookie.

* Note: This check solely relied on the version number of the remote SquirrelMail to assess this vulnerability, so this might be a false positive.

* References:
http://www.osvdb.org/displayvuln.php?osvdb_id=8292
http://marc.theaimsgroup.com/?l=bugtraq&m=108334862800260
http://marc.theaimsgroup.com/?l=bugtraq&m=108611554415078&w=2
http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt
http://marc.theaimsgroup.com/?l=squirrelmail-cvs&m=108532891231712
http://marc.theaimsgroup.com/?l=squirrelmail-cvs&m=108309375029888

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail prior to 1.4.3
SquirrelMail Project Team, SquirrelMail 1.5.0, 1.5.1 development version
Unix Any version
Linux Any version
Recommendation Upgrade to the latest version of SquirrelMail (1.4.3 or later), available from the SquirrelMail Download web site at http://www.squirrelmail.org/download.php
Related URL CVE-2004-0519,CVE-2004-0520,CVE-2004-0521 (CVE)
Related URL 10246,10397,10439 (SecurityFocus)
Related URL 16025,16285,16235 (ISS)