Korean
<< Back
VID 21961
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The SquirrelMail package is vulnerable to an arbitrary variables overwriting vulnerability via the compose.php script. SquirrelMail is a Web mail system written in PHP4. SquirrelMail versions 1.4.0 through 1.4.7 are vulnerable to an arbitrary variables overwriting vulnerability, caused by an unsafe handling of expired sessions passed to the GET request for the '/src/compose.php' script. A remote attacker could exploit this vulnerability to obtain sensitive information or read and write other user's preferences or email attachments.

* Note: This check requires an account which can login to the remote web mail server to scan. Absence of these condition will result in the check not being performed and a False Negative for all vulnerable hosts.

* References:
http://www.squirrelmail.org/security/issue/2006-08-11
http://www.squirrelmail.org/patches/sqm1.4.7-expired-post-fix-full.patch
http://www.gulftech.org/?node=research&article_id=00108-08112006
http://secunia.com/advisories/21354
http://www.frsirt.com/english/advisories/2006/3271

* Platforms Affected:
SquirrelMail Project Team, SquirrelMail versions 1.4.0 through 1.4.7
Any operating system Any version
Recommendation Upgrade to the latest version of SquirrelMail (1.4.8 or later), available from the SquirrelMail Download Web page at http://www.squirrelmail.org/download.php
Related URL CVE-2006-4019 (CVE)
Related URL 19486 (SecurityFocus)
Related URL 28365 (ISS)