VID |
21842 |
Severity |
30 |
Port |
80, ... |
Protocol |
TCP |
Class |
CGI |
Detailed Description |
A version of SquirrelMail which is older than version 1.4.6 is detected as installed on the host. SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions prior to 1.4.6 are vulnerable to multiple cross-site scripting and IMAP-injection vulnerabilities, which are due to the application's failure to properly sanitize user-supplied input. An attacker may leverage any of the cross-site scripting issues to have arbitrary script code executed in the browser of an unsuspecting user in the context of the affected site. This may facilitate the theft of cookie-based authentication credentials as well as other attacks. CRLF injection vulnerability (aka "IMAP injection vulnerability") in SquirrelMail 1.4.0 to 1.4.5 could allow a remote attacker to inject arbitrary IMAP commands via newline characters in the mailbox parameter of the sqimap_mailbox_select command.
* Note: This check solely relied on the version number of SquirrelMail installed on the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.squirrelmail.org/security/issue/2006-02-01 http://www.squirrelmail.org/security/issue/2006-02-10 http://www.squirrelmail.org/security/issue/2006-02-15 http://archives.neohapsis.com/archives/bugtraq/2006-02/0513.html http://www.frsirt.com/english/advisories/2006/0689 http://secunia.com/advisories/18985/
* Platforms Affected: SquirrelMail Project Team, SquirrelMail versions prior to 1.4.6 (including 1.4.6-RC1) Any operating system Any version |
Recommendation |
Upgrade to the latest version (1.4.6 or later) of SquirrelMail, available from the SquirrelMail Download Web page at http://www.squirrelmail.org/download.php |
Related URL |
CVE-2006-0188,CVE-2006-0195,CVE-2006-0377 (CVE) |
Related URL |
16756 (SecurityFocus) |
Related URL |
24847,24848,24849 (ISS) |
|