First published: Sun Jul 17 2011(Updated: )
Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | <=1.4.21 | |
SquirrelMail | =0.1 | |
SquirrelMail | =0.1.1 | |
SquirrelMail | =0.1.2 | |
SquirrelMail | =0.2 | |
SquirrelMail | =0.2.1 | |
SquirrelMail | =0.3 | |
SquirrelMail | =0.3.1 | |
SquirrelMail | =0.3pre1 | |
SquirrelMail | =0.3pre2 | |
SquirrelMail | =0.4 | |
SquirrelMail | =0.4pre1 | |
SquirrelMail | =0.4pre2 | |
SquirrelMail | =0.5 | |
SquirrelMail | =0.5pre1 | |
SquirrelMail | =0.5pre2 | |
SquirrelMail | =1.0 | |
SquirrelMail | =1.0.1 | |
SquirrelMail | =1.0.2 | |
SquirrelMail | =1.0.3 | |
SquirrelMail | =1.0.4 | |
SquirrelMail | =1.0.5 | |
SquirrelMail | =1.0.6 | |
SquirrelMail | =1.0pre1 | |
SquirrelMail | =1.0pre2 | |
SquirrelMail | =1.0pre3 | |
SquirrelMail | =1.1.0 | |
SquirrelMail | =1.1.1 | |
SquirrelMail | =1.1.2 | |
SquirrelMail | =1.1.3 | |
SquirrelMail | =1.2 | |
SquirrelMail | =1.2.0 | |
SquirrelMail | =1.2.0-rc3 | |
SquirrelMail | =1.2.1 | |
SquirrelMail | =1.2.2 | |
SquirrelMail | =1.2.3 | |
SquirrelMail | =1.2.4 | |
SquirrelMail | =1.2.5 | |
SquirrelMail | =1.2.6 | |
SquirrelMail | =1.2.6-rc1 | |
SquirrelMail | =1.2.7 | |
SquirrelMail | =1.2.8 | |
SquirrelMail | =1.2.9 | |
SquirrelMail | =1.2.10 | |
SquirrelMail | =1.2.11 | |
SquirrelMail | =1.3.0 | |
SquirrelMail | =1.3.1 | |
SquirrelMail | =1.3.2 | |
SquirrelMail | =1.4 | |
SquirrelMail | =1.4-rc1 | |
SquirrelMail | =1.4.0 | |
SquirrelMail | =1.4.0-rc1 | |
SquirrelMail | =1.4.0-rc2a | |
SquirrelMail | =1.4.0-r1 | |
SquirrelMail | =1.4.1 | |
SquirrelMail | =1.4.2 | |
SquirrelMail | =1.4.2-r1 | |
SquirrelMail | =1.4.2-r2 | |
SquirrelMail | =1.4.2-r3 | |
SquirrelMail | =1.4.2-r4 | |
SquirrelMail | =1.4.2-r5 | |
SquirrelMail | =1.4.3 | |
SquirrelMail | =1.4.3-r3 | |
SquirrelMail | =1.4.3-rc1 | |
SquirrelMail | =1.4.3a | |
SquirrelMail | =1.4.3aa | |
SquirrelMail | =1.4.4 | |
SquirrelMail | =1.4.4-rc1 | |
SquirrelMail | =1.4.5 | |
SquirrelMail | =1.4.5-rc1 | |
SquirrelMail | =1.4.6 | |
SquirrelMail | =1.4.6-rc1 | |
SquirrelMail | =1.4.6_cvs | |
SquirrelMail | =1.4.7 | |
SquirrelMail | =1.4.8 | |
SquirrelMail | =1.4.8.4fc6 | |
SquirrelMail | =1.4.9 | |
SquirrelMail | =1.4.9a | |
SquirrelMail | =1.4.10 | |
SquirrelMail | =1.4.10a | |
SquirrelMail | =1.4.11 | |
SquirrelMail | =1.4.12 | |
SquirrelMail | =1.4.13 | |
SquirrelMail | =1.4.15 | |
SquirrelMail | =1.4.15-rc1 | |
SquirrelMail | =1.4.15rc1 | |
SquirrelMail | =1.4.16 | |
SquirrelMail | =1.4.17 | |
SquirrelMail | =1.4.18 | |
SquirrelMail | =1.4.19 | |
SquirrelMail | =1.4.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2753 has a moderate severity rating as it allows cross-site request forgery attacks that can lead to unauthorized actions on behalf of users.
To fix CVE-2011-2753, users should upgrade to SquirrelMail version 1.4.22 or later.
CVE-2011-2753 can be exploited through cross-site request forgery (CSRF) attacks targeting the empty trash and index order functionalities.
CVE-2011-2753 affects SquirrelMail versions 1.4.21 and earlier, including versions 0.1 through 1.4.20.
Exploiting CVE-2011-2753 can lead to unauthorized actions being performed on the account of an unsuspecting user.