First published: Wed Dec 11 2002(Updated: )
Cross-site scripting (XSS) vulnerability in read_body.php for SquirrelMail 1.2.10, 1.2.9, and earlier allows remote attackers to insert script and HTML via the (1) mailbox and (2) passed_id parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =1.2.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-1341 is classified as a medium severity vulnerability due to its potential for user exploitation through cross-site scripting.
To fix CVE-2002-1341, it is recommended to upgrade SquirrelMail to the latest version that patches this vulnerability.
SquirrelMail versions 1.2.10, 1.2.9, 1.2.8, 1.2.7, and 1.2.6 are affected by CVE-2002-1341.
CVE-2002-1341 enables attackers to perform cross-site scripting (XSS) attacks through manipulating mailbox and passed_id parameters.
To test for CVE-2002-1341, you can try injecting script tags into relevant fields in the affected SquirrelMail web application.