First published: Thu Jun 16 2005(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.4 allow remote attackers to inject arbitrary web script or HTML via unknown attack vectors in (1) the URL or (2) an e-mail message.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.2 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =1.4.3_rc1 | |
SquirrelMail | =1.4.3a | |
SquirrelMail | =1.44 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1769 is classified as a moderate severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2005-1769, upgrade SquirrelMail to version 1.4.5 or later that addresses the cross-site scripting vulnerabilities.
CVE-2005-1769 affects SquirrelMail versions 1.4.0 through 1.4.4.
CVE-2005-1769 allows remote attackers to inject arbitrary web script or HTML into vulnerable SquirrelMail installations.
While upgrading is the best option, sanitizing user inputs can help mitigate the risks associated with CVE-2005-1769.