SB2011071502 - Multiple vulnerabilities in SquirrelMail
Published: July 15, 2011 Updated: August 11, 2020
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 5 secuirty vulnerabilities.
1) Code Injection (CVE-ID: CVE-2011-2752)
The vulnerability allows a remote non-authenticated attacker to manipulate or delete data.
CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a (newline) character, a different vulnerability than CVE-2010-4555.
2) Cross-site request forgery (CVE-ID: CVE-2011-2753)
The vulnerability allows a remote attacker to perform cross-site request forgery attacks.
The vulnerability exists due to insufficient validation of the HTTP request origin. A remote attacker can trick the victim to visit a specially crafted web page and perform arbitrary actions on behalf of the victim on the vulnerable website.
3) Cross-site scripting (CVE-ID: CVE-2011-2023)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in functions/mime.php in SquirrelMail before 1.4.22. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
4) Input validation error (CVE-ID: CVE-2010-4554)
The vulnerability allows a remote non-authenticated attacker to manipulate data.
functions/page_header.php in SquirrelMail 1.4.21 and earlier does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
5) Cross-site scripting (CVE-ID: CVE-2010-4555)
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in SquirrelMail 1.4.21 and earlier when processing vectors involving (1) drop-down selection lists, (2) the . A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.
References
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://www.debian.org/security/2011/dsa-2291
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:123
- http://www.squirrelmail.org/security/issue/2011-07-11
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68587
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119
- https://bugzilla.redhat.com/show_bug.cgi?id=720694
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68586
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://securitytracker.com/id?1025766
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121
- http://support.apple.com/kb/HT5130
- http://www.squirrelmail.org/security/issue/2011-07-10
- https://bugzilla.redhat.com/show_bug.cgi?id=720695
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/functions/page_header.php?view=patch&r1=14117&r2=14116&pathrev=14117
- http://www.squirrelmail.org/security/issue/2011-07-12
- https://bugzilla.redhat.com/show_bug.cgi?id=720693
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68512
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68510
- https://exchange.xforce.ibmcloud.com/vulnerabilities/68511