First published: Tue May 12 2009(Updated: )
A, From SquirrelMail vulnerability report (<a href="http://www.squirrelmail.org/security/issue/2009-05-08">http://www.squirrelmail.org/security/issue/2009-05-08</a>): Two issues were fixed that both allowed an attacker to run arbitrary script (XSS) on most any SquirrelMail page by getting the user to click on specially crafted SquirrelMail links. Credits: Niels Teusink and Christian Balzer Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13670">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13670</a> B, From SquirrelMail vulnerability report: (<a href="http://www.squirrelmail.org/security/issue/2009-05-09">http://www.squirrelmail.org/security/issue/2009-05-09</a>): An issue was fixed wherein input to the contrib/decrypt_headers.php script was not sanitized and allowed arbitrary script execution upon submission of certain values. Credits: Niels Teusink Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13672">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13672</a>
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | ||
SquirrelMail | <=1.4.17 | |
SquirrelMail | =0.1 | |
SquirrelMail | =0.1.1 | |
SquirrelMail | =0.1.2 | |
SquirrelMail | =0.2 | |
SquirrelMail | =0.2.1 | |
SquirrelMail | =0.3 | |
SquirrelMail | =0.3.1 | |
SquirrelMail | =0.3pre1 | |
SquirrelMail | =0.3pre2 | |
SquirrelMail | =0.4 | |
SquirrelMail | =0.4pre1 | |
SquirrelMail | =0.4pre2 | |
SquirrelMail | =0.5 | |
SquirrelMail | =0.5pre1 | |
SquirrelMail | =0.5pre2 | |
SquirrelMail | =1.0 | |
SquirrelMail | =1.0.1 | |
SquirrelMail | =1.0.2 | |
SquirrelMail | =1.0.3 | |
SquirrelMail | =1.0.4 | |
SquirrelMail | =1.0.5 | |
SquirrelMail | =1.0.6 | |
SquirrelMail | =1.0pre1 | |
SquirrelMail | =1.0pre2 | |
SquirrelMail | =1.0pre3 | |
SquirrelMail | =1.1.0 | |
SquirrelMail | =1.1.1 | |
SquirrelMail | =1.1.2 | |
SquirrelMail | =1.1.3 | |
SquirrelMail | =1.2 | |
SquirrelMail | =1.2.0 | |
SquirrelMail | =1.2.0_rc3 | |
SquirrelMail | =1.2.1 | |
SquirrelMail | =1.2.2 | |
SquirrelMail | =1.2.3 | |
SquirrelMail | =1.2.4 | |
SquirrelMail | =1.2.5 | |
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =1.2.10 | |
SquirrelMail | =1.2.11 | |
SquirrelMail | =1.3.0 | |
SquirrelMail | =1.3.1 | |
SquirrelMail | =1.3.2 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.4.0 | |
SquirrelMail | =1.4.0_rc1 | |
SquirrelMail | =1.4.0_rc2a | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.10 | |
SquirrelMail | =1.4.10a | |
SquirrelMail | =1.4.11 | |
SquirrelMail | =1.4.12 | |
SquirrelMail | =1.4.15 | |
SquirrelMail | =1.4.15_rc1 | |
SquirrelMail | =1.4.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1578 has a medium severity rating and is classified as a cross-site scripting (XSS) vulnerability.
To fix CVE-2009-1578, upgrade SquirrelMail to version 1.4.17 or later.
CVE-2009-1578 affects all SquirrelMail versions prior to 1.4.17.
CVE-2009-1578 is a cross-site scripting (XSS) vulnerability that allows attackers to execute arbitrary scripts.
Yes, CVE-2009-1578 can be exploited remotely by an attacker to inject malicious scripts into SquirrelMail pages.