GLSA Advocate
Joined: 12 May 2004 Posts: 2663
|
Posted: Tue Jun 21, 2005 8:56 pm Post subject: [ GLSA 200506-19 ] SquirrelMail: Several XSS vulnerabilities |
|
|
Gentoo Linux Security Advisory
Title: SquirrelMail: Several XSS vulnerabilities (GLSA 200506-19)
Severity: low
Exploitable: remote
Date: June 21, 2005
Bug(s): #95937
ID: 200506-19
Synopsis
Squirrelmail is vulnerable to several cross-site scripting vulnerabilities which could lead to a compromise of webmail accounts.
Background
SquirrelMail is a webmail package written in PHP. It supports IMAP and SMTP protocols.
Affected Packages
Package: mail-client/squirrelmail
Vulnerable: < 1.4.4
Unaffected: >= 1.4.4
Unaffected: < 1.4.0
Architectures: All supported architectures
Description
SquirrelMail is vulnerable to several cross-site scripting issues, most reported by Martijn Brinkers.
Impact
By enticing a user to read a specially-crafted e-mail or using a manipulated URL, an attacker can execute arbitrary scripts running in the context of the victim's browser. This could lead to a compromise of the user's webmail account, cookie theft, etc.
Workaround
There is no known workaround at this time.
Resolution
All SquirrelMail users should upgrade to the latest version: Code: | # emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4" | Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.
References
SquirrelMail Advisory
CAN-2005-1769
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total |
|