Vulnerabilities > CVE-2002-1276 - Unspecified vulnerability in Squirrelmail 1.2.8

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN

Summary

An incomplete fix for a cross-site scripting (XSS) vulnerability in SquirrelMail 1.2.8 calls the strip_tags function on the PHP_SELF value but does not save the result back to that variable, leaving it open to cross-site scripting attacks.

Vulnerable Configurations

Part Description Count
Application
Squirrelmail
1

Nessus

  • NASL familyCGI abuses : XSS
    NASL idSQUIRREMAIL_CROSS_SITE_SCRIPTING.NASL
    descriptionThe remote host seems to be vulnerable to a security problem in SquirrelMail. The
    last seen2020-06-01
    modified2020-06-02
    plugin id11415
    published2003-03-19
    reporterThis script is Copyright (C) 2003-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/11415
    titleSquirrelMail 1.2.9 / 1.2.10 read_body.php Multiple Parameter XSS
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-191.NASL
    descriptionSeveral cross site scripting vulnerabilities have been found in squirrelmail, a feature-rich webmail package written in PHP4. The Common Vulnerabilities and Exposures (CVE) project identified the following vulnerabilities : - CAN-2002-1131: User input is not always sanitized so execution of arbitrary code on a client computer is possible. This can happen after following a malicious URL or by viewing a malicious addressbook entry. - CAN-2002-1132: Another problem could make it possible for an attacker to gain sensitive information under some conditions. When a malformed argument is appended to a link, an error page will be generated which contains the absolute pathname of the script. However, this information is available through the Contents file of the distribution anyway. These problems have been fixed in version 1.2.6-1.1 for the current stable distribution (woody) and in version 1.2.8-1.1 for the unstable distribution (sid). The old stable distribution (potato) is not affected since it doesn
    last seen2020-06-01
    modified2020-06-02
    plugin id15028
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15028
    titleDebian DSA-191-1 : squirrelmail - XSS

Redhat

advisories
rhsa
idRHSA-2003:042