6.1
CVSSv3

CVE-2019-12970

Published: 01/07/2019 Updated: 30/07/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
CVSS v3 Base Score: 6.1 | Impact Score: 2.7 | Exploitability Score: 2.8
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

XSS exists in SquirrelMail up to and including 1.4.22 and 1.5.x up to and including 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

squirrelmail squirrelmail

Vendor Advisories

Impact: Moderate Public Date: 2019-07-01 CWE: CWE-79 Bugzilla: 1726498: CVE-2019-12970 squirrelmail: im ...

Exploits

SquirrelMail version 1422 suffers from a cross site scripting vulnerability ...

Github Repositories

Patches for Squirrelmail

WARNING: unmaintained I am no longer using Squirrelmail so this repo is unmaintained Squirrelmail has a known security flaw (CVE-2020-14933) for which my patchset only contains an incomplete fix There's an open, unreviewed pull request that may help squirrelpatches Patches for Squirrelmail what The development of Squirrelmail has been slow lately No release happened fo