Korean
<< Back
VID 21397
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail, according to its version number, has a Cross-Site Scripting Vulnerability.
SquirrelMail is a Web mail system written in PHP4. Some versions of SquirrelMail are vulnerable to cross-site scripting in 'mime.php' script, caused by a failure of the application to properly validate encoded text in certain headers in the 'decodeHeader' function. A remote attacker could create a specially crafted e-mail containing malicious code in headers, and then could persuade a target user to view it. Once the e-mail is viewed, the embedded codes would be executed in the victim's Web browser. A remote attacker could use this vulnerability to steal the victim's cookie-based authentication credentials.

* Note: This check solely relied on the version number of SquirrelMail on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://securitytracker.com/alerts/2004/Nov/1012169.html
http://www.osvdb.org/displayvuln.php?osvdb_id=11603

* Platforms Affected:
SquirrelMail 1.4.3a and prior
SquirrelMail 1.5.1-cvs
Linux Any version
Unix Any version
Microsoft Windows Any version
Recommendation For SquirrelMail 1.4.3a:
Apply the patch for this vulnerability, available from the SquirrelMail Web site at http://prdownloads.sourceforge.net/squirrelmail/sm143a-xss.diff?download

For SquirrelMail 1.5.1-cvs:
Upgrade to the latest CVS Snapshot of SquirrelMail, available from the SquirrelMail Web site at http://www.squirrelmail.org/

For Gentoo Linux:
Upgrade to the latest version of SquirrelMail (1.4.3a-r2 or later), as listed in Gentoo Linux Security Advisory GLSA 200411-25 at http://www.gentoo.org/security/en/glsa/glsa-200411-25.xml

For other distributions:
Contact your vendor for upgrade or patch information
Related URL CVE-2004-1036 (CVE)
Related URL 11653 (SecurityFocus)
Related URL 18031 (ISS)