4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.016 Low
EPSS
Percentile
86.0%
SquirrelMail is a standards-based webmail package written in PHP4.
A bug was found in the way SquirrelMail handled the $_POST variable. If a
user is tricked into visiting a malicious URL, the user’s SquirrelMail
preferences could be read or modified. The Common Vulnerabilities and
Exposures project assigned the name CAN-2005-2095 to this issue.
Several cross-site scripting bugs were discovered in SquirrelMail. An
attacker could inject arbitrary Javascript or HTML content into
SquirrelMail pages by tricking a user into visiting a carefully crafted
URL, or by sending them a carefully constructed HTML email message. The
Common Vulnerabilities and Exposures project assigned the name
CAN-2005-1769 to this issue.
All users of SquirrelMail should upgrade to this updated package, which
contains backported patches that resolve these issues.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
RedHat | any | src | squirrelmail | < 1.4.3a-12.EL4 | squirrelmail-1.4.3a-12.EL4.src.rpm |
RedHat | any | noarch | squirrelmail | < 1.4.3a-12.EL4 | squirrelmail-1.4.3a-12.EL4.noarch.rpm |