Joined: 12 May 2004
|Posted: Tue Jun 21, 2005 8:56 pm Post subject: [ GLSA 200506-19 ] SquirrelMail: Several XSS vulnerabilities
|Gentoo Linux Security Advisory
Title: SquirrelMail: Several XSS vulnerabilities (GLSA 200506-19)
Date: June 21, 2005
Squirrelmail is vulnerable to several cross-site scripting vulnerabilities which could lead to a compromise of webmail accounts.
SquirrelMail is a webmail package written in PHP. It supports IMAP and SMTP protocols.
Vulnerable: < 1.4.4
Unaffected: >= 1.4.4
Unaffected: < 1.4.0
Architectures: All supported architectures
SquirrelMail is vulnerable to several cross-site scripting issues, most reported by Martijn Brinkers.
By enticing a user to read a specially-crafted e-mail or using a manipulated URL, an attacker can execute arbitrary scripts running in the context of the victim's browser. This could lead to a compromise of the user's webmail account, cookie theft, etc.
There is no known workaround at this time.
All SquirrelMail users should upgrade to the latest version:
Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.
|# emerge --sync
# emerge --ask --oneshot --verbose ">=mail-client/squirrelmail-1.4.4"
Last edited by GLSA on Sun May 07, 2006 4:57 pm; edited 1 time in total