Nessus Plugin #16228

Plugin Index

Note: This file has been created from a downloaded version of the Nessus Plugins from http://www.nessus.org/. Therefore, the information here can be outdated.

SquirrelMail < 1.4.4 XSS Vulnerabilities

Family:
CGI abuses : XSS
Category:
infos
Copyright:
This script is Copyright (C) 2005 George A. Theall
Summary:
Checks for Three XSS Vulnerabilities in SquirrelMail < 1.4.4
Version:
$Revision: 1.4 $
Cve_id:
CAN-2005-0075, CAN-2005-0103, CAN-2005-0104
Bugtraq_id:
12337
Xrefs:
-
Description:

The target is running at least one instance of SquirrelMail whose
version number suggests it is vulnerable to one or more cross-site
scripting vulnerabilities :

- Insufficient escaping of integer variables in webmail.php allows a
remote attacker to include HTML / script into a SquirrelMail webpage
(affects 1.4.0-RC1 - 1.4.4-RC1).

- Insufficient checking of incoming URL vars in webmail.php allows an
attacker to include arbitrary remote web pages in the SquirrelMail
frameset (affects 1.4.0-RC1 - 1.4.4-RC1).

- A recent change in prefs.php allows an attacker to provide a
specially crafted URL that could include local code into the
SquirrelMail code if and only if PHP's register_globals setting is
enabled (affects 1.4.3-RC1 - 1.4.4-RC1).

***** Nessus has determined the vulnerability exists on the target
***** simply by looking at the version number of Squirrelmail
***** installed there.

Solution : Upgrade to SquirrelMail 1.4.4 or later.
Risk factor : Medium
Generiert am 27.04.2005 um 18:49:54 Uhr.