Korean
<< Back
VID 21469
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail, according to its version number, has multiple cross-site scripting vulnerabilities. SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions 1.4.0-RC1 through to 1.4.4-RC1 are vulnerable to cross-site scripting attacks, caused by improper validation of URL variables in the prefs.php and webmail.php scripts. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* Note: This check solely relied on the version number of the SquirrelMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://secunia.com/advisories/13962/
http://www.securityfocus.com/advisories/7953

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail versions 1.4.0-RC1 through to 1.4.4-RC1
Any operating system Any version
Recommendation Upgrade to the latest version (1.4.4 or later) of SquirrelMail, available from the SquirrelMail Web site at http://www.squirrelmail.org/

-- OR --

Apply the patches for these vulnerabilities, as listed in SquirrelMail Security Advisories 2005-01-14, 2005-01-19 and 2005-01-20:
http://www.squirrelmail.org/security/issue/2005-01-14
http://www.squirrelmail.org/security/issue/2005-01-19
http://www.squirrelmail.org/security/issue/2005-01-20
Related URL CVE-2005-0075,CVE-2005-0103,CVE-2005-0104 (CVE)
Related URL 12337 (SecurityFocus)
Related URL 19034,19036,19037 (ISS)