SquirrelMail webmail.php cross-site scripting

squirrelmail-webmail-xss (24847) The risk level is classified as MediumMedium Risk

Description:

SquirrelMail is vulnerable to cross-site scripting, caused by improper validation of user-supplied input by the webmail.php script. A remote attacker could exploit this vulnerability using the right_frame parameter to execute script in a victim's Web browser within the security context of the hosting Web site, allowing the attacker to steal the victim's cookie-based authentication credentials.


Consequences:

Gain Access

Remedy:

Upgrade to the current CVS available from the SquirrelMail Web site. See References.

For Debian GNU/Linux:
Refer to DSA-988-1 for patch, upgrade, or suggested workaround information. See References.

For Red Hat Linux:
Refer to RHSA-2006:0283-6 for patch, upgrade, or suggested workaround information. See References.

For Gentoo Linux:
Refer to Gentoo Linux Security Announcement GLSA 2006-03-09 for patch, upgrade, or suggested workaround information. See References.

References:

  • SourceForge.net CVS Repository: cvs: squirrelmail.
  • SquirrelMail Web site: Possible XSS through right_frame parameter in webmail.php.
  • SquirrelMail Web site: ANNOUNCE: SquirrelMail 1.5.1 Released.
  • ASA-2006-096: squirrelmail security update (RHSA-2006-0283)
  • BID-16756: SquirrelMail Multiple Cross-Site Scripting and IMAP Injection Vulnerabilities
  • CVE-2006-0188: webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.
  • DSA-988: squirrelmail -- several vulnerabilities
  • GLSA-200603-09: SquirrelMail: Cross-site scripting and IMAP command injection
  • MDKSA-2006:049: Updated squirrelmail packages fix vulnerabilities
  • RHSA-2006-0283: squirrelmail security update
  • SA18985: SquirrelMail Multiple Vulnerabilities
  • SECTRACK ID: 1015662: SquirrelMail Input Validation Bugs Let Remote Users Inject IMAP Commands and Conduct Cross-Site Scripting Attacks
  • SUSE-SR:2006:005: SUSE Security Summary Report
  • VUPEN/ADV-2006-0689: SquirrelMail Multiple Cross Site Scripting and IMAP Injection Vulnerabilities

Platforms Affected:

  • Debian Debian Linux 3.0
  • Debian Debian Linux 3.1
  • Gentoo Linux
  • MandrakeSoft Mandrake Linux Corporate Server 3.0
  • MandrakeSoft Mandrake Linux Corporate Server 3.0 X86_64
  • RedHat Enterprise Linux 3 WS
  • RedHat Enterprise Linux 3 Desktop
  • RedHat Enterprise Linux 3 ES
  • RedHat Enterprise Linux 3 AS
  • RedHat Enterprise Linux 4 WS
  • RedHat Enterprise Linux 4 Desktop
  • RedHat Enterprise Linux 4 AS
  • RedHat Enterprise Linux 4 ES
  • SquirrelMail SquirrelMail 1.4.5 and prior

Reported:

Feb 22, 2006

The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.

For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this

Return to the main page