First published: Tue May 12 2009(Updated: )
A, From SquirrelMail vulnerability report (<a href="http://www.squirrelmail.org/security/issue/2009-05-08">http://www.squirrelmail.org/security/issue/2009-05-08</a>): Two issues were fixed that both allowed an attacker to run arbitrary script (XSS) on most any SquirrelMail page by getting the user to click on specially crafted SquirrelMail links. Credits: Niels Teusink and Christian Balzer Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13670">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13670</a> B, From SquirrelMail vulnerability report: (<a href="http://www.squirrelmail.org/security/issue/2009-05-09">http://www.squirrelmail.org/security/issue/2009-05-09</a>): An issue was fixed wherein input to the contrib/decrypt_headers.php script was not sanitized and allowed arbitrary script execution upon submission of certain values. Credits: Niels Teusink Patch: <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13672">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=rev&revision=13672</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-500363 is considered high due to the potential for cross-site scripting (XSS) attacks.
To fix REDHAT-BUG-500363, ensure that you are using the latest version of SquirrelMail that addresses these vulnerabilities.
REDHAT-BUG-500363 is associated with a cross-site scripting (XSS) vulnerability.
SquirrelMail is the affected software in REDHAT-BUG-500363.
REDHAT-BUG-500363 can enable attackers to execute arbitrary scripts on SquirrelMail pages.