SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   SquirrelMail Vendors:   SquirrelMail Development Team
SquirrelMail Input Validation Hole in 'mailbox' Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1010007
SecurityTracker URL:  http://securitytracker.com/id/1010007
CVE Reference:   CVE-2004-0519   (Links to External Site)
Updated:  Jun 5 2004
Original Entry Date:  Apr 30 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 1.4.2
Description:   An input validation vulnerability was reported in SquirrelMail in the processing of folder names. A remote user can conduct cross-site scripting attacks.

A remote user can reportedly create a specially crafted URL that, when loaded by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the vulnerable software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

A demonstration exploit URL is provided:

http://[target]/mail/src/compose.php?mailbox="><script>window.alert(document.cookie)</script>

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the vulnerable software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   No solution was available at the time of this entry. The vendor is reportedly working on a fixed version (1.4.3).
Vendor URL:  www.squirrelmail.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
May 24 2004 (Gentoo Issues Fix) SquirrelMail Input Validation Hole in 'mailbox' Lets Remote Users Conduct Cross-Site Scripting Attacks
Gentoo has released a fix.
Aug 3 2004 (Debian Issues Fix) SquirrelMail Input Validation Hole in 'mailbox' Lets Remote Users Conduct Cross-Site Scripting Attacks
Debian has released a fix.
Oct 2 2004 (Fedora Issues Fix for RH Linux) SquirrelMail Input Validation Hole in 'mailbox' Lets Remote Users Conduct Cross-Site Scripting Attacks
Fedora has released a fix for Red Hat Linux 9.
Dec 30 2004 (Conectiva Issues Fix) SquirrelMail Input Validation Hole in 'mailbox' Lets Remote Users Conduct Cross-Site Scripting Attacks
Conectiva has released a fix.



 Source Message Contents

Subject:  SquirrelMail Cross Scripting Attacks....




SquirrelMail latest version (although is tested on version 1.4.2) is prone to many cross scripting attacks that can be used to steal
 user cookies.The Exploit lies in the way squirrel mail represents the folder names and shows them.To make the matters worse.No extra
 unique variable added to the url for each user therefore it is easy for the attacker to just pass the url in mail and steal the session
 cookie.

Some of the exploit are at :

http://victim.com/mail/src/compose.php?mailbox=INBOX

which can be replaced as follows

http://victim.com/mail/src/compose.php?mailbox=">&lt;script&gt;malacious script&lt;/script&gt;

Example:

http://victim.com/mail/src/compose.php?mailbox=">&lt;script&gt;window.alert(document.cookie)&lt;/script&gt;

-------------------------------------------------------------------------

Squirrel Mail Coders have been informed of this vulnerability but the vulnerability still exists in their latest version.

-------------------------------------------------------------------------

Please Let me know if i am wrong anywhere...

Regards,
Alvin

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC