Korean
<< Back
VID 21854
Severity 20
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail program is vulnerable to a cookie-theft vulnerability in the 'src/redirect.php' script. SquirrelMail is a Web mail system written in PHP4. SquirrelMail version 1.4.6 and earlier versions are vulnerable to a cookie-theft vulnerability, caused by improper validation of the 'base_uri' parameter in the 'functions/strings.php' script before using it to set the path for its cookies. If PHP's 'register_globals' setting is enabled, and a malicious site is running in same domain, an attacker could exploit this flaw to steal cookies associated with the affected application.

* References:
http://www.squirrelmail.org/changelog.php

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail version 1.4.6 and earlier versions
Any operating system Any version
Recommendation Upgrade to the latest version (1.4.7-CVS or later) of SquirrelMail, available from the SquirrelMail Download Web page at http://www.squirrelmail.org/download.php

As a workaround, disable PHP's 'register_globals' setting.
Related URL (CVE)
Related URL 17005 (SecurityFocus)
Related URL (ISS)