Vulnerabilities > CVE-2004-0519 - Cross-Site Scripting vulnerability in SquirrelMail Folder Name

047910
CVSS 6.8 - MEDIUM
Attack vector
NETWORK
Attack complexity
MEDIUM
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
sgi
squirrelmail
nessus
exploit available

Summary

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.

Exploit-Db

descriptionSquirrelMail 1.4.x Folder Name Cross-Site Scripting Vulnerability. CVE-2004-0519. Webapps exploit for php platform
idEDB-ID:24068
last seen2016-02-02
modified2004-04-30
published2004-04-30
reporterAlvin Alex
sourcehttps://www.exploit-db.com/download/24068/
titleSquirrelMail 1.4.x Folder Name Cross-Site Scripting Vulnerability

Nessus

  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2004-160.NASL
    descriptionA SQL injection flaw was found in SquirrelMail version 1.4.2 and earlier. If SquirrelMail is configured to store user addressbooks in the database, a remote attacker could use this flaw to execute arbitrary SQL statements. The Common Vulnerabilities and Exposures project has assigned the name CVE-2004-0521 to this issue. A number of cross-site scripting (XSS) flaws in SquirrelMail version 1.4.2 and earlier could allow remote attackers to execute scripts as other web users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520 to these issues. This update includes the SquirrelMail version 1.4.3a which is not vulnerable to these issues. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id13716
    published2004-07-23
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13716
    titleFedora Core 2 : squirrelmail-1.4.3-1 (2004-160)
  • NASL familyRed Hat Local Security Checks
    NASL idREDHAT-RHSA-2004-240.NASL
    descriptionAn updated SquirrelMail package that fixes several security vulnerabilities is now available. SquirrelMail is a webmail package written in PHP. Multiple vulnerabilities have been found which affect the version of SquirrelMail shipped with Red Hat Enterprise Linux 3. A SQL injection flaw was found in SquirrelMail version 1.4.2 and earlier. If SquirrelMail is configured to store user addressbooks in the database, a remote attacker could use this flaw to execute arbitrary SQL statements. The Common Vulnerabilities and Exposures project has assigned the name CVE-2004-0521 to this issue. A number of cross-site scripting (XSS) flaws in SquirrelMail version 1.4.2 and earlier could allow remote attackers to execute script as other web users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520 to these issues. All users of SquirrelMail are advised to upgrade to the erratum package containing SquirrelMail version 1.4.3a which is not vulnerable to these issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id12503
    published2004-07-06
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/12503
    titleRHEL 3 : squirrelmail (RHSA-2004:240)
  • NASL familyDebian Local Security Checks
    NASL idDEBIAN_DSA-535.NASL
    descriptionFour vulnerabilities were discovered in squirrelmail : - CAN-2004-0519 Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php. - CAN-2004-0520 Cross-site scripting (XSS) vulnerability in mime.php for SquirrelMail before 1.4.3 allows remote attackers to insert arbitrary HTML and script via the content-type mail header, as demonstrated using read_body.php. - CAN-2004-0521 SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php. - CAN-2004-0639 Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and earlier allow remote attackers to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.
    last seen2020-06-01
    modified2020-06-02
    plugin id15372
    published2004-09-29
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/15372
    titleDebian DSA-535-1 : squirrelmail - several vulnerabilities
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_C5519420CEC211D88898000D6111A684.NASL
    descriptionRoman Medina-Heigl Hernandez did a survey which other webmail systems where vulnerable to a bug he discovered in SquirrelMail. This advisory summarizes the results.
    last seen2020-06-01
    modified2020-06-02
    plugin id36521
    published2009-04-23
    reporterThis script is Copyright (C) 2009-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/36521
    titleFreeBSD : 'Content-Type' XSS vulnerability affecting other webmail systems (c5519420-cec2-11d8-8898-000d6111a684)
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200405-16.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200405-16 (Multiple XSS Vulnerabilities in SquirrelMail) Several unspecified cross-site scripting (XSS) vulnerabilities and a well-hidden SQL injection vulnerability were found. An XSS attack allows an attacker to insert malicious code into a web-based application. SquirrelMail does not check for code when parsing variables received via the URL query string. Impact : One of the XSS vulnerabilities could be exploited by an attacker to steal cookie-based authentication credentials from the user
    last seen2020-06-01
    modified2020-06-02
    plugin id14502
    published2004-08-30
    reporterThis script is Copyright (C) 2004-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/14502
    titleGLSA-200405-16 : Multiple XSS Vulnerabilities in SquirrelMail
  • NASL familyCGI abuses
    NASL idSQUIRRELMAIL_143.NASL
    descriptionThe remote host is running SquirrelMail, a web-based mail server. There are several flaws in all versions less than 1.4.3 and development versions 1.5.0 and 1.5.1 that allow for local root access and remote cross-site scripting (XSS) attacks. ***** Nessus has determined the vulnerability exists on the target ***** simply by looking at the version number of Squirrelmail ***** installed there.
    last seen2020-06-01
    modified2020-06-02
    plugin id14228
    published2004-05-05
    reporterThis script is Copyright (C) 2004-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/14228
    titleSquirrelMail < 1.4.3 Multiple Vulnerabilities
  • NASL familyFedora Local Security Checks
    NASL idFEDORA_2004-159.NASL
    descriptionA SQL injection flaw was found in SquirrelMail version 1.4.2 and earlier. If SquirrelMail is configured to store user addressbooks in the database, a remote attacker could use this flaw to execute arbitrary SQL statements. The Common Vulnerabilities and Exposures project has assigned the name CVE-2004-0521 to this issue. A number of cross-site scripting (XSS) flaws in SquirrelMail version 1.4.2 and earlier could allow remote attackers to execute scripts as other web users. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2004-0519 and CVE-2004-0520 to these issues. This update includes the SquirrelMail version 1.4.3a which is not vulnerable to these issues. Note that Tenable Network Security has extracted the preceding description block directly from the Fedora security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen2020-06-01
    modified2020-06-02
    plugin id13715
    published2004-07-23
    reporterThis script is Copyright (C) 2004-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/13715
    titleFedora Core 1 : squirrelmail-1.4.3-0.f1.1 (2004-159)
  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_CONTENTTYPE_XSS.NASL
    descriptionThe following package needs to be updated: ilohamail
    last seen2016-09-26
    modified2004-07-06
    plugin id12529
    published2004-07-06
    reporterTenable
    sourcehttps://www.tenable.com/plugins/index.php?view=single&id=12529
    titleFreeBSD : 'Content-Type' XSS vulnerability affecting other webmail systems (25)

Oval

  • accepted2010-09-20T04:00:03.552-04:00
    classvulnerability
    contributors
    • nameJay Beale
      organizationBastille Linux
    • nameJonathan Baker
      organizationThe MITRE Corporation
    descriptionMultiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
    familyunix
    idoval:org.mitre.oval:def:1006
    statusaccepted
    submitted2004-06-29T12:00:00.000-04:00
    titleSquirrelMail Cross-site Scripting Vulnerability I
    version7
  • accepted2013-04-29T04:04:13.841-04:00
    classvulnerability
    contributors
    • nameAharon Chernin
      organizationSCAP.com, LLC
    • nameDragos Prisaca
      organizationG2, Inc.
    definition_extensions
    • commentThe operating system installed on the system is Red Hat Enterprise Linux 3
      ovaloval:org.mitre.oval:def:11782
    • commentCentOS Linux 3.x
      ovaloval:org.mitre.oval:def:16651
    descriptionMultiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
    familyunix
    idoval:org.mitre.oval:def:10274
    statusaccepted
    submitted2010-07-09T03:56:16-04:00
    titleMultiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.
    version26

Redhat

advisories
rhsa
idRHSA-2004:240
rpmssquirrelmail-0:1.4.3-0.e3.1