Vulnerability Scanning Solutions, LLC.
Home
Our Process
Residential
Corporate
What We Scan For
Sample Report
Client List
Terms
Contact Us
What We Scan For
Family: CGI abuses --> Category: infos

SquirrelMail < 1.45 Multiple Vulnerabilities Vulnerability Scan


Vulnerability Scan Summary
Checks for multiple vulnerabilities in SquirrelMail < 1.45

Detailed Explanation for this Vulnerability Test

Synopsis :

The remote web server contains a PHP application that is affected by
multiple vulnerabilities.

Description :

According to its banner, the version of SquirrelMail installed on the
remote host is prone to multiple flaws :

- Post Variable Handling Vulnerabilities
Using specially-crafted POST requests, a possible hacker may
be able to set random variables in the file
'options_identities.php', which could lead to accessing
other users' preferences, cross-site scripting attacks,
and writing to arbitrary files.

- Multiple Cross-Site Scripting Vulnerabilities
Using a specially-crafted URL or email message, an
attacker may be able to exploit these flaws, stealing
cookie-based session identifiers and thereby hijacking
SquirrelMail sessions.

See also :

http://sourceforge.net/mailarchive/forum.php?thread_id=7519477&forum_id=1988
http://www.squirrelmail.org/security/issue/2005-06-15
http://www.securityfocus.com/archive/1/405202
http://www.squirrelmail.org/security/issue/2005-07-13

Solution :

Upgrade to SquirrelMail 1.45 or later.

Threat Level:

Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:N/A:N/I:P/B:N)

Click HERE for more information and discussions on this network vulnerability scan.

VSS, LLC.

P.O. Box 827051

Pembroke Pines, FL 33082-7051

Vulnerability Scanning Solutions, LLC.