what you don't know can hurt you
Home Files News &[SERVICES_TAB]About Contact Add New

squirrelInclusion.txt

squirrelInclusion.txt
Posted Jan 30, 2005
Authored by Jonathan Angliss | Site squirrelmail.org

SquirrelMail Security Advisory - SquirrelMail 1.4.4 has been released to resolve a number of security issues. Manoel Zaninetti reported an issue in src/webmail.php which would allow a crafted URL to include a remote web page. A possible cross site scripting issue exists in src/webmail.php that is only accessible when the PHP installation is running with register_globals set to On.

tags | advisory, remote, web, php, xss
advisories | CVE-2005-0104, CVE-2005-0103
SHA-256 | 5773619867fb37cf0ce9656875f5125f481bb03dec469652efec6634f72bd105

squirrelInclusion.txt

Change Mirror Download
SquirrelMail Security Advisory
==============================

SquirrelMail 1.4.4 has been released to resolve a number of security
issues disclosed below. It is strongly recommended that all running
SquirrelMail prior to 1.4.4 upgrade to the latest release.

Remote File Inclusion
---------------------
Manoel Zaninetti reported an issue in src/webmail.php which would allow a
crafted URL to include a remote web page. This was assigned CAN-2005-0103
by the Common Vulnerabilities and Exposures.

Cross Site Scripting Issues
---------------------------
A possible cross site scripting issue exists in src/webmail.php that is
only accessible when the PHP installation is running with register_globals
set to On. This issue was uncovered internally by the SquirrelMail
Development team. This isssue was assigned CAN-2005-0104 by the Common
Vulnerabilities and Exposures.

A second issue which was resolved in the 1.4.4-rc1 release was uncovered
and assigned CAN-2004-1036 by the Common Vulnerabilities and Exposures.
This issue could allow a remote user to send a specially crafted header
and cause execution of script (such as javascript) in the client browser.

Local File Inclusion
--------------------
A possible local file inclusion issue was uncovered by one of our
developers involving custom preference handlers. This issue is only
active if the PHP installation is running with register_globals set to On.


It is strongly suggested that all users running SquirrelMail prior to
1.4.4 upgrade to the latest release. Those using a development release,
should upgrade to the latest snapshots to ensure they have the latest
updates for these issues. A full list of changes in this, and previous
releases can be found here (http://www.squirrelmail.org/changelog.php).

For further updates on security issues, details are posted to
http://www.squirrelmail.org/security/. Any security issues should be
emailed to security@squirrelmail.org.

We'd like to express thanks for those that have worked with us on getting
security issues resolved with SquirrelMail, and hope that people continue
to do so in such fashion, it is much appreciated.

--
Jonathan Angliss
SquirrelMail Development Team

Login or Register to add favorites

File Archive:

September 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Sep 1st
    261 Files
  • 2
    Sep 2nd
    17 Files
  • 3
    Sep 3rd
    38 Files
  • 4
    Sep 4th
    52 Files
  • 5
    Sep 5th
    23 Files
  • 6
    Sep 6th
    27 Files
  • 7
    Sep 7th
    0 Files
  • 8
    Sep 8th
    1 Files
  • 9
    Sep 9th
    16 Files
  • 10
    Sep 10th
    38 Files
  • 11
    Sep 11th
    21 Files
  • 12
    Sep 12th
    40 Files
  • 13
    Sep 13th
    18 Files
  • 14
    Sep 14th
    0 Files
  • 15
    Sep 15th
    0 Files
  • 16
    Sep 16th
    21 Files
  • 17
    Sep 17th
    51 Files
  • 18
    Sep 18th
    23 Files
  • 19
    Sep 19th
    0 Files
  • 20
    Sep 20th
    0 Files
  • 21
    Sep 21st
    0 Files
  • 22
    Sep 22nd
    0 Files
  • 23
    Sep 23rd
    0 Files
  • 24
    Sep 24th
    0 Files
  • 25
    Sep 25th
    0 Files
  • 26
    Sep 26th
    0 Files
  • 27
    Sep 27th
    0 Files
  • 28
    Sep 28th
    0 Files
  • 29
    Sep 29th
    0 Files
  • 30
    Sep 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close