SquirrelMail < 1.4.4 decodeHeader HTML Injection

Medium Nessus Network Monitor Plugin ID 2401

Synopsis

The remote host allows attackers to bypass user authentication.

Description

The remote host is running SquirrelMail, a webmail system written in PHP. Versions of SquirrelMail prior to 1.4.4 are vulnerable to an email HTML injection vulnerability. A remote attacker can exploit this flaw to gain access to users' accounts.

Solution

Upgrade to SquirrelMail 1.4.4 or higher.

Plugin Details

Severity: Medium

ID: 2401

File Name: 2401.prm

Family: CGI

Published: 2004/11/11

Modified: 2016/01/21

Dependencies: 1442

Risk Information

Risk Factor: Medium

CVSSv2

Base Score: 6.4

Temporal Score: 5.6

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N

Temporal Vector: CVSS2#E:H/RL:OF/RC:C

CVSSv3

Base Score: 6.5

Temporal Score: 6.2

Vector: CVSS3#AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N

Temporal Vector: CVSS3#E:H/RL:O/RC:C

Reference Information

BID: 11653