options_identities.php in SquirrelMail 1.4.4 and previous versions uses the extract function to process the $_POST variable, which allows remote malicious users to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squirrelmail squirrelmail 1.0.5 |
||
squirrelmail squirrelmail 1.2.0 |
||
squirrelmail squirrelmail 1.2.5 |
||
squirrelmail squirrelmail 1.2.6 |
||
squirrelmail squirrelmail 1.4.3 |
||
squirrelmail squirrelmail 1.4.3_rc1 |
||
squirrelmail squirrelmail 1.2.11 |
||
squirrelmail squirrelmail 1.2.2 |
||
squirrelmail squirrelmail 1.4 |
||
squirrelmail squirrelmail 1.4.0 |
||
squirrelmail squirrelmail 1.2.1 |
||
squirrelmail squirrelmail 1.2.10 |
||
squirrelmail squirrelmail 1.2.7 |
||
squirrelmail squirrelmail 1.2.8 |
||
squirrelmail squirrelmail 1.2.9 |
||
squirrelmail squirrelmail 1.4.3a |
||
squirrelmail squirrelmail 1.44 |
||
squirrelmail squirrelmail 1.0.4 |
||
squirrelmail squirrelmail 1.2.3 |
||
squirrelmail squirrelmail 1.2.4 |
||
squirrelmail squirrelmail 1.4.1 |
||
squirrelmail squirrelmail 1.4.2 |