squirrelmail

Page content
  • Author: voroskoi
  • Vulnerable: 1.4.9-1
  • Unaffected: 1.4.10-1terminus1

Some vulnerabilities have been reported in SquirrelMail, which can be exploited by malicious people to conduct cross-site scripting and cross-site request forgery attacks.

  1. SquirrelMail does not sanitise charsets in HTML or JavaScript data before sending it to browsers. This can be exploited to execute arbitrary HTML and script code in a user’s browser session in context of an affected site by sending malicious HTML emails. Reportedly, this affects Internet Explorer only.
  2. The script compose.php allows users to perform certain actions via HTTP requests without performing validity checks to verify the request. This can be exploited to e.g. send emails from another user’s account by including malicious links to images in an email.

CVEs: