SquirrelMail search.php Multiple Variable XSS

2002-09-19T00:00:00
ID OSVDB:4264
Type osvdb
Reporter DarC KonQuesT(DarC_KonQuesT@phreaker.net)
Modified 2002-09-19T00:00:00

Description

Vulnerability Description

Squirrel Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the "search.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Solution Description

Upgrade to version 1.2.8 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

Short Description

Squirrel Mail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate multiple variables upon submission to the "search.php" script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

Manual Testing Notes

http://[victim]/webmail/src/search.php?mailbox=<script>alert('vulnerable!')</script>&what=x&where=BODY&submit=Search

http://[victim]/webmail/src/search.php?mailbox=INBOX&what=x&where=<script>alert('vulnerable!')</script>&submit=Search

References:

Vendor URL: http://www.squirrelmail.org/ Vendor Specific Solution URL: http://sourceforge.net/project/shownotes.php?group_id=311&release_id=110774 Vendor Specific Advisory URL Vendor Specific Advisory URL Related OSVDB ID: 4262 Related OSVDB ID: 4265 Related OSVDB ID: 4263 Other Advisory URL: http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html Mail List Post: http://archives.neohapsis.com/archives/bugtraq/2002-09/0248.html ISS X-Force ID: 10145 CVE-2002-1131 Bugtraq ID: 5763