First published: Tue Dec 05 2006(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.2 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =1.4.3_r3 | |
SquirrelMail | =1.4.3_rc1 | |
SquirrelMail | =1.4.3aa | |
SquirrelMail | =1.4.4 | |
SquirrelMail | =1.4.4_rc1 | |
SquirrelMail | =1.4.5 | |
SquirrelMail | =1.4.6 | |
SquirrelMail | =1.4.6_cvs | |
SquirrelMail | =1.4.6_rc1 | |
SquirrelMail | =1.4.7 | |
SquirrelMail | =1.4_rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-6142 is classified as a moderate severity vulnerability due to the potential for cross-site scripting attacks.
To fix CVE-2006-6142, upgrade to SquirrelMail version 1.4.10 or later where the vulnerabilities have been addressed.
CVE-2006-6142 affects SquirrelMail versions 1.4.0 through 1.4.9.
The vulnerabilities in CVE-2006-6142 can allow remote attackers to inject arbitrary web script or HTML into the application.
There are no official workarounds for CVE-2006-6142; upgrading to a secure version is recommended.