|
Family: CGI abuses --> Category: infos
SquirrelMail < 1.45 Multiple Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Checks for multiple vulnerabilities in SquirrelMail < 1.45
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP application that is affected by
multiple vulnerabilities.
Description :
According to its banner, the version of SquirrelMail installed on the
remote host is prone to multiple flaws :
- Post Variable Handling Vulnerabilities
Using specially-crafted POST requests, a possible hacker may
be able to set random variables in the file
'options_identities.php', which could lead to accessing
other users' preferences, cross-site scripting attacks,
and writing to arbitrary files.
- Multiple Cross-Site Scripting Vulnerabilities
Using a specially-crafted URL or email message, an
attacker may be able to exploit these flaws, stealing
cookie-based session identifiers and thereby hijacking
SquirrelMail sessions.
See also :
http://sourceforge.net/mailarchive/forum.php?thread_id=7519477&forum_id=1988
http://www.squirrelmail.org/security/issue/2005-06-15
http://www.securityfocus.com/archive/1/405202
http://www.squirrelmail.org/security/issue/2005-07-13
Solution :
Upgrade to SquirrelMail 1.45 or later.
Threat Level:
Low / CVSS Base Score : 2
(AV:R/AC:L/Au:NR/C:N/A:N/I:P/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|