| VID |
21469 |
| Severity |
30 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
CGI |
| Detailed Description |
The SquirrelMail, according to its version number, has multiple cross-site scripting vulnerabilities. SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions 1.4.0-RC1 through to 1.4.4-RC1 are vulnerable to cross-site scripting attacks, caused by improper validation of URL variables in the prefs.php and webmail.php scripts. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.
* Note: This check solely relied on the version number of the SquirrelMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://secunia.com/advisories/13962/ http://www.securityfocus.com/advisories/7953
* Platforms Affected: SquirrelMail Project Team, SquirrelMail versions 1.4.0-RC1 through to 1.4.4-RC1 Any operating system Any version |
| Recommendation |
Upgrade to the latest version (1.4.4 or later) of SquirrelMail, available from the SquirrelMail Web site at http://www.squirrelmail.org/
-- OR --
Apply the patches for these vulnerabilities, as listed in SquirrelMail Security Advisories 2005-01-14, 2005-01-19 and 2005-01-20: http://www.squirrelmail.org/security/issue/2005-01-14 http://www.squirrelmail.org/security/issue/2005-01-19 http://www.squirrelmail.org/security/issue/2005-01-20 |
| Related URL |
CVE-2005-0075,CVE-2005-0103,CVE-2005-0104 (CVE) |
| Related URL |
12337 (SecurityFocus) |
| Related URL |
19034,19036,19037 (ISS) |
|