6.8
CVSSv2

CVE-2004-0639

Published: 06/08/2004 Updated: 11/07/2017
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
VMScore: 685
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in Squirrelmail 1.2.10 and previous versions allow remote malicious users to inject arbitrary HTML or script via (1) the $mailer variable in read_body.php, (2) the $senderNames_part variable in mailbox_display.php, and possibly other vectors including (3) the $event_title variable or (4) the $event_text variable.

Vulnerable Product Search on Vulmon Subscribe to Product

sgi propack 3.0

squirrelmail squirrelmail 1.2.0

squirrelmail squirrelmail 1.2.1

squirrelmail squirrelmail 1.2.6

squirrelmail squirrelmail 1.2.7

squirrelmail squirrelmail 1.5_dev

squirrelmail squirrelmail 1.2.10

squirrelmail squirrelmail 1.2.11

squirrelmail squirrelmail 1.2.8

squirrelmail squirrelmail 1.2.9

open webmail open webmail 2.31

open webmail open webmail 2.32

squirrelmail squirrelmail 1.2.4

squirrelmail squirrelmail 1.2.5

squirrelmail squirrelmail 1.4.2

squirrelmail squirrelmail 1.4.3_rc1

open webmail open webmail 2.30

squirrelmail squirrelmail 1.2.2

squirrelmail squirrelmail 1.2.3

squirrelmail squirrelmail 1.4

squirrelmail squirrelmail 1.4.1

Exploits

source: wwwsecurityfocuscom/bid/10450/info SquirrelMail is reported to be prone to a 'from' field email header HTML injection vulnerability This issue is due to a failure of the application to properly sanitize user-supplied email header strings An attacker can exploit this issue to gain access to an unsuspecting user's cookie based au ...