4.3
CVSSv2

CVE-2007-1262

Published: 11/05/2007 Updated: 11/10/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 up to and including 1.4.9a allow remote malicious users to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail squirrelmail 1.4.3_r3

squirrelmail squirrelmail 1.4.3_rc1

squirrelmail squirrelmail 1.4.6_cvs

squirrelmail squirrelmail 1.4.6_rc1

squirrelmail squirrelmail 1.4.2

squirrelmail squirrelmail 1.4.3

squirrelmail squirrelmail 1.4.5

squirrelmail squirrelmail 1.4.6

squirrelmail squirrelmail 1.4.3a

squirrelmail squirrelmail 1.4.3aa

squirrelmail squirrelmail 1.4.7

squirrelmail squirrelmail 1.4.8

squirrelmail squirrelmail 1.4.0

squirrelmail squirrelmail 1.4.1

squirrelmail squirrelmail 1.4.4

squirrelmail squirrelmail 1.4.4_rc1

squirrelmail squirrelmail 1.4.9

squirrelmail squirrelmail 1.4.9a

Vendor Advisories

It was discovered that the webmail package Squirrelmail performs insufficient sanitising inside the HTML filter, which allows the injection of arbitrary web script code during the display of HTML email messages For the oldstable distribution (sarge) this problem has been fixed in version 2:144-11 For the stable distribution (etch) this problem ...