First published: Tue Jul 12 2011(Updated: )
Multiple cross-site scripting (XSS) flaws were found in the SquirrelMail webmail client: * XSS flaws in generic options inputs, * XSS flaw in the SquirrelSpell plug-in, * XSS flaw in the Index Order page. Also protection against Cross-site Request Forgery (CSRF) flaws has been added to the empty trash feature and to the Index Order page. The CSRF flaws got a dedicated CVE identifier of <a href="https://access.redhat.com/security/cve/CVE-2011-2753">CVE-2011-2753</a>. For further information have a look at: [1] <a href="https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2753">https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2753</a> Upstream advisory: [2] <a href="http://www.squirrelmail.org/security/issue/2011-07-11">http://www.squirrelmail.org/security/issue/2011-07-11</a> Relevant upstream patch: [3] <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of REDHAT-BUG-720694 is classified as critical due to multiple cross-site scripting vulnerabilities.
To fix REDHAT-BUG-720694, update your SquirrelMail to the latest version that contains the patches for the identified vulnerabilities.
The main vulnerabilities in REDHAT-BUG-720694 include multiple cross-site scripting (XSS) flaws and previously unprotected cross-site request forgery (CSRF) issues.
REDHAT-BUG-720694 affects multiple versions of SquirrelMail that do not have the necessary security updates applied.
Yes, there are known exploits for the cross-site scripting vulnerabilities detailed in REDHAT-BUG-720694.