First published: Thu Jun 03 2004(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SGI ProPack | =3.0 | |
SquirrelMail | =1.0.4 | |
SquirrelMail | =1.0.5 | |
SquirrelMail | =1.2.0 | |
SquirrelMail | =1.2.1 | |
SquirrelMail | =1.2.2 | |
SquirrelMail | =1.2.3 | |
SquirrelMail | =1.2.4 | |
SquirrelMail | =1.2.5 | |
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =1.2.10 | |
SquirrelMail | =1.2.11 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2004-0519 is classified as a medium severity vulnerability due to its potential to exploit multiple cross-site scripting flaws.
To fix CVE-2004-0519, upgrade SquirrelMail to version 1.4.3 or later, which addresses these vulnerabilities.
CVE-2004-0519 affects SquirrelMail versions 1.0.4 through 1.4.2.
Attackers can use CVE-2004-0519 to execute arbitrary scripts in the context of other users, potentially stealing authentication information.
If your organization uses SquirrelMail version 1.0.4 to 1.4.2, CVE-2004-0519 poses a relevant risk that requires prompt attention.