Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 up to and including 1.4.9 allow remote malicious users to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
squirrelmail squirrelmail 1.4 |
||
squirrelmail squirrelmail 1.4.1 |
||
squirrelmail squirrelmail 1.4.4_rc1 |
||
squirrelmail squirrelmail 1.4.5 |
||
squirrelmail squirrelmail 1.4.3aa |
||
squirrelmail squirrelmail 1.4.4 |
||
squirrelmail squirrelmail 1.4_rc1 |
||
squirrelmail squirrelmail 1.4.2 |
||
squirrelmail squirrelmail 1.4.3 |
||
squirrelmail squirrelmail 1.4.6 |
||
squirrelmail squirrelmail 1.4.6_cvs |
||
squirrelmail squirrelmail 1.4.3_r3 |
||
squirrelmail squirrelmail 1.4.3_rc1 |
||
squirrelmail squirrelmail 1.4.6_rc1 |
||
squirrelmail squirrelmail 1.4.7 |