Cross-site scripting in SquirrelMail - CVE-2011-2023
Published: July 15, 2011 / Updated: August 11, 2020
SquirrelMail
Detailed vulnerability description
Vulnerability allows a remote attacker to perform XSS attacks.
The vulnerability is caused by an input validation error in functions/mime.php in SquirrelMail before 1.4.22. A remote attacker can trick the victim to follow a specially crafted link and execute arbitrary HTML and script code in victim's browser in security context of vulnerable website.
Successful exploitation of this vulnerability may allow a remote attacker to steal potentially sensitive information, change appearance of the web page, perform phishing and drive-by-download attacks.
How to mitigate CVE-2011-2023
Sources
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://securitytracker.com/id?1025766
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14121
- http://support.apple.com/kb/HT5130
- http://www.debian.org/security/2011/dsa-2291
- http://www.mandriva.com/security/advisories?name=MDVSA-2011:123
- http://www.squirrelmail.org/security/issue/2011-07-10
- https://bugzilla.redhat.com/show_bug.cgi?id=720695