Korean
<< Back
VID 21842
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description A version of SquirrelMail which is older than version 1.4.6 is detected as installed on the host. SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions prior to 1.4.6 are vulnerable to multiple cross-site scripting and IMAP-injection vulnerabilities, which are due to the application's failure to properly sanitize user-supplied input. An attacker may leverage any of the cross-site scripting issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. CRLF injection vulnerability (aka "IMAP injection vulnerability") in SquirrelMail 1.4.0 to 1.4.5 could allow a remote attacker to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command.

* Note: This check solely relied on the version number of SquirrelMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
http://www.squirrelmail.org/security/issue/2006-02-01
http://www.squirrelmail.org/security/issue/2006-02-10
http://www.squirrelmail.org/security/issue/2006-02-15
http://archives.neohapsis.com/archives/bugtraq/2006-02/0513.html
http://www.frsirt.com/english/advisories/2006/0689
http://secunia.com/advisories/18985/

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail versions prior to 1.4.6 (including 1.4.6-RC1)
Any operating system Any version
Recommendation Upgrade to the latest version (1.4.6 or later) of SquirrelMail, available from the SquirrelMail Download Web page at http://www.squirrelmail.org/download.php
Related URL CVE-2006-0188,CVE-2006-0195,CVE-2006-0377 (CVE)
Related URL 16756 (SecurityFocus)
Related URL 24847,24848,24849 (ISS)