First published: Mon Jul 01 2019(Updated: )
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | <=1.4.22 | |
SquirrelMail | >=1.5.0<=1.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-12970 is considered a medium severity vulnerability due to its potential to allow cross-site scripting (XSS) attacks.
To fix CVE-2019-12970, upgrade SquirrelMail to version 1.5.2 or later, as these versions include patches for the XSS vulnerability.
Organizations using SquirrelMail versions 1.4.22 and 1.5.0 to 1.5.2 are affected by CVE-2019-12970.
CVE-2019-12970 allows attackers to execute malicious scripts from HTML emails, leading to potential XSS attacks.
The consequences of CVE-2019-12970 include unauthorized access to user sessions and data manipulation through XSS.