SquirrelMail contrib/decrypt_headers.php XSS

Medium Nessus Plugin ID 38793

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it's different from CVSS.

VPR Score: 3

Synopsis

The remote webmail application is affected by a cross-site scripting vulnerability.

Description

The installed version of SquirrelMail fails to sanitize user-supplied input before using it in the 'contrib/decrypt_headers.php' script to dynamically generate HTML.

An unauthenticated attacker can exploit this issue to launch cross-site scripting attacks against the affected application.

There are also reportedly several other issues, including cross-site scripting vulnerabilities, a code injection vulnerability, and a session fixation vulnerability, though Nessus has not tested for these.

Solution

Upgrade to SquirrelMail 1.4.18 or later.

See Also

http://www.squirrelmail.org/security/issue/2009-05-08

Plugin Details

Severity: Medium

ID: 38793

File Name: squirrelmail_1418.nasl

Version: 1.14

Type: remote

Published: 2009/05/15

Updated: 2018/07/30

Dependencies: 10815, 12647

Risk Information

Risk Factor: Medium

VPR Score: 3

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.7

Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:squirrelmail:squirrelmail

Required KB Items: www/squirrelmail

Excluded KB Items: Settings/disable_cgi_scanning

Exploit Available: false

Exploit Ease: No exploit is required

Exploited by Nessus: true

Reference Information

CVE: CVE-2009-1578

BID: 34916

CWE: 79