SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   SquirrelMail Vendors:   SquirrelMail Development Team
SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
SecurityTracker Alert ID:  1012169
SecurityTracker URL:  http://securitytracker.com/id/1012169
CVE Reference:   CVE-2004-1036   (Links to External Site)
Updated:  Nov 17 2004
Original Entry Date:  Nov 10 2004
Impact:   Disclosure of authentication information, Disclosure of user information, Execution of arbitrary code via network, Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 1.4.3a and earlier; SquirrelMail 1.5.1-cvs before October 23, 2004
Description:   An input validation vulnerability was reported in SquirrelMail in 'mime.php'. A remote user can conduct cross-site scripting attacks.

The vendor reported that the software does not properly validate encoded text in certain headers. A remote user can create specially crafted e-mail that, when viewed by a target user, will cause arbitrary scripting code to be executed by the target user's browser. The code will originate from the site running the SquirrelMail software and will run in the security context of that site. As a result, the code will be able to access the target user's cookies (including authentication cookies), if any, associated with the site, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.

The flaw resides in 'mime.php'.

The vendor credits Joost Pol with reporting this flaw.

Impact:   A remote user can access the target user's cookies (including authentication cookies), if any, associated with the site running the SquirrelMail software, access data recently submitted by the target user via web form to the site, or take actions on the site acting as the target user.
Solution:   A patch for the 1.4.3a branch is available at:

http://prdownloads.sourceforge.net/squirrelmail/sm143a-xss.diff?download

To apply this patch, copy the sm143a-xss.diff file into the base SquirrelMail directory and use the following command:

patch -p0 < sm143a-xss.diff

If you are using SquirrelMail 1.5.1-cvs, update from CVS or use the latest snapshot:

http://www.squirrelmail.org/

Vendor URL:  www.squirrelmail.org/ (Links to External Site)
Cause:   Input validation error
Underlying OS:  Linux (Any), UNIX (Any), Windows (Any)

Message History:   This archive entry has one or more follow-up message(s) listed below.
Nov 17 2004 (Gentoo Issues Fix) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Gentoo has released a fix.
Nov 29 2004 (Fedora Issues Fix for FC2) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Fedora has released a fix for Fedora Core 2.
Nov 29 2004 (Fedora Issues Fix for FC3) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Fedora has released a fix for Fedora Core 3.
Dec 2 2004 (Conectiva Issues Fix) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Conectiva has released a fix.
Dec 24 2004 (Red Hat Issues Fix) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Red Hat has released a fix.
Jan 26 2005 (Apple Issues Fix) SquirrelMail Input Validation Hole in 'mime.php' Lets Remote Users Conduct Cross-Site Scripting Attacks
Apple has released a fix for Mac OS X.



 Source Message Contents

Subject:  [SquirrelMail Security Advisory] Cross Site Scripting in encoded text


SquirrelMail Security Notice
============================

About
-----
SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in pure PHP support for the IMAP and SMTP protocols,
and all pages render in pure HTML 4.0 (with no JavaScript required)
for maximum compatibility across browsers. It has very few
requirements and is very easy to configure and install. SquirrelMail
has all the functionality you would want from an email client,
including strong MIME support, address books, and folder manipulation.

Details
-------
There is a cross site scripting issue in the decoding of encoded text
in certain headers. SquirrelMail correctly decodes the specially
crafted header, but doesn't sanitize the decoded strings.

Affected
--------
SquirrelMail 1.4.3a and earlier
SquirrelMail 1.5.1-cvs before 23rd October 2004

Resolution
----------
A patch has been published to resolve this issue for the SquirrelMail
1.4.3a branch, and can be downloaded from here:

 
http://prdownloads.sourceforge.net/squirrelmail/sm143a-xss.diff?download

To apply this patch, copy the sm143a-xss.diff file into the base
SquirrelMail directory, and follow the command:

  patch -p0 < sm143a-xss.diff

Those using SquirrelMail 1.5.1-cvs should update using CVS, or use a
copy of the latest snapshot downloadable from the SquirrelMail
website
at:

  http://www.squirrelmail.org


Acknowledgements
----------------
Special thanks goes to Joost Pol for notifying us about this issue.


Comments
--------
The SquirrelMail development team work hard with people reporting
security issues in an attempt to resolve issues. We appreciate those
that are willing to dedicate the time to work with us on any issue
they uncover in the SquirrelMail project.

If any further issues are uncovered, a dedicated mail address can be
used to report the issue.  The address is security@squirrelmail.org.

-- 
Jonathan Angliss
(jon@squirrelmail.org)

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC