First published: Sat Jan 17 2009(Updated: )
A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663.
Credit: secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0030 is classified as a medium severity vulnerability due to the potential for unauthorized access to user data.
To fix CVE-2009-0030, update SquirrelMail to a version that addresses this cookie management issue.
CVE-2009-0030 specifically affects SquirrelMail version 1.4.8.
CVE-2009-0030 is a session management vulnerability that allows access to other users' session data.
CVE-2009-0030 can be exploited by remote authenticated users who can manipulate the session cookie.