| VID |
21397 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The SquirrelMail, according to its version number, has a Cross-Site Scripting Vulnerability. SquirrelMail is a Web mail system written in PHP4. Some versions of SquirrelMail are vulnerable to cross-site scripting in 'mime.php' script, caused by a failure of the application to properly validate encoded text in certain headers in the 'decodeHeader' function. A remote attacker could create a specially crafted e-mail containing malicious code in headers, and then could persuade a target user to view it. Once the e-mail is viewed, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.
* Note: This check solely relied on the version number of SquirrelMail on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://securitytracker.com/alerts/2004/Nov/1012169.html http://www.osvdb.org/displayvuln.php?osvdb_id=11603
* Platforms Affected: SquirrelMail 1.4.3a and prior SquirrelMail 1.5.1-cvs Linux Any version Unix Any version Microsoft Windows Any version |
| Recommendation |
For SquirrelMail 1.4.3a: Apply the patch for this vulnerability, available from the SquirrelMail Web site at http://prdownloads.sourceforge.net/squirrelmail/sm143a-xss.diff?download
For SquirrelMail 1.5.1-cvs: Upgrade to the latest CVS Snapshot of SquirrelMail, available from the SquirrelMail Web site at http://www.squirrelmail.org/
For Gentoo Linux: Upgrade to the latest version of SquirrelMail (1.4.3a-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200411-25 at http://www.gentoo.org/security/en/glsa/glsa-200411-25.xml
For other distributions: Contact your vendor for upgrade or patch information |
| Related URL |
CVE-2004-1036 (CVE) |
| Related URL |
11653 (SecurityFocus) |
| Related URL |
18031 (ISS) |
|