Vulnerabilities > CVE-2002-1131 - Unspecified vulnerability in Squirrelmail
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Cross-site scripting vulnerabilities in SquirrelMail 1.2.7 and earlier allows remote attackers to execute script as other web users via (1) addressbook.php, (2) options.php, (3) search.php, or (4) help.php.
Vulnerable Configurations
Exploit-Db
description | SquirrelMail 1.2.6/1.2.7 Multiple Cross Site Scripting Vulnerablities. CVE-2002-1131. Webapps exploit for php platform |
id | EDB-ID:21811 |
last seen | 2016-02-02 |
modified | 2002-09-19 |
published | 2002-09-19 |
reporter | DarC KonQuest |
source | https://www.exploit-db.com/download/21811/ |
title | SquirrelMail 1.2.6/1.2.7 - Multiple Cross-Site Scripting Vulnerablities |
Nessus
NASL family | Debian Local Security Checks |
NASL id | DEBIAN_DSA-191.NASL |
description | Several cross site scripting vulnerabilities have been found in squirrelmail, a feature-rich webmail package written in PHP4. The Common Vulnerabilities and Exposures (CVE) project identified the following vulnerabilities : - CAN-2002-1131: User input is not always sanitized so execution of arbitrary code on a client computer is possible. This can happen after following a malicious URL or by viewing a malicious addressbook entry. - CAN-2002-1132: Another problem could make it possible for an attacker to gain sensitive information under some conditions. When a malformed argument is appended to a link, an error page will be generated which contains the absolute pathname of the script. However, this information is available through the Contents file of the distribution anyway. These problems have been fixed in version 1.2.6-1.1 for the current stable distribution (woody) and in version 1.2.8-1.1 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 15028 |
published | 2004-09-29 |
reporter | This script is Copyright (C) 2004-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/15028 |
title | Debian DSA-191-1 : squirrelmail - XSS |
code |
|
Redhat
advisories |
|
References
- http://archives.neohapsis.com/archives/bugtraq/2002-09/0246.html
- http://www.securityfocus.com/bid/5763
- http://www.iss.net/security_center/static/10145.php
- http://www.redhat.com/support/errata/RHSA-2002-204.html
- http://www.debian.org/security/2002/dsa-191
- http://sourceforge.net/project/shownotes.php?group_id=311&release_id=110774