First published: Tue Jul 12 2011(Updated: )
An cross-site scripting (XSS) flaw was found in the way SquirrelMail performed sanitization of MIME messages containing certain <style> HTML tags. A remote attacker could provide a specially-crafted message, which once opened in SquirrelMail webmail client could lead to arbitrary JavaScript or HTML code execution. Upstream advisory: [1] <a href="http://www.squirrelmail.org/security/issue/2011-07-10">http://www.squirrelmail.org/security/issue/2011-07-10</a> Relevant patch: [2] <a href="http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121">http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121</a>
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability REDHAT-BUG-720695 is classified as a cross-site scripting (XSS) flaw which can lead to significant security risks for users.
To fix REDHAT-BUG-720695, update to the latest version of SquirrelMail that includes the security patch addressing this XSS vulnerability.
Users of SquirrelMail are primarily affected by REDHAT-BUG-720695 due to improper sanitization of MIME messages.
REDHAT-BUG-720695 enables remote attackers to execute arbitrary JavaScript code through specially-crafted messages.
REDHAT-BUG-720695 was disclosed on July 10, 2011.