GLSA-200501-39 : SquirrelMail: Multiple vulnerabilities

high Nessus Plugin ID 16430

Synopsis

The remote Gentoo host is missing one or more security-related patches.

Description

The remote host is affected by the vulnerability described in GLSA-200501-39 (SquirrelMail: Multiple vulnerabilities)

SquirrelMail fails to properly sanitize certain strings when decoding specially crafted strings, which can lead to PHP file inclusion and XSS.
Insufficient checking of incoming URLs in prefs.php (CAN-2005-0075) and in webmail.php (CAN-2005-0103).
Insufficient escaping of integers in webmail.php (CAN-2005-0104).
Impact :

By sending a specially crafted URL, an attacker can execute arbitrary code from the local system with the permissions of the web server. Furthermore by enticing a user to load a specially crafted URL, it is possible to display arbitrary remote web pages in Squirrelmail's frameset and execute arbitrary scripts running in the context of the victim's browser. This could lead to a compromise of the user's webmail account, cookie theft, etc.
Workaround :

The arbitrary code execution is only possible with 'register_globals' set to 'On'. Gentoo ships PHP with 'register_globals' set to 'Off' by default. There are no known workarounds for the other issues at this time.

Solution

All SquirrelMail users should upgrade to the latest version:
# emerge --sync # emerge --ask --oneshot --verbose '>=mail-client/squirrelmail-1.4.4' Note: Users with the vhosts USE flag set should manually use webapp-config to finalize the update.

See Also

https://sourceforge.net/p/linux-usb/mailman/message/10628451/

https://security.gentoo.org/glsa/200501-39

Plugin Details

Severity: High

ID: 16430

File Name: gentoo_GLSA-200501-39.nasl

Version: 1.18

Type: local

Published: 2/14/2005

Updated: 1/6/2021

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.5

CVSS v2

Risk Factor: High

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Information

CPE: p-cpe:/a:gentoo:linux:squirrelmail, cpe:/o:gentoo:linux

Required KB Items: Host/local_checks_enabled, Host/Gentoo/release, Host/Gentoo/qpkg-list

Patch Publication Date: 1/28/2005

Reference Information

CVE: CVE-2005-0075, CVE-2005-0103, CVE-2005-0104

GLSA: 200501-39