CVE-2004-0519
CVSS6.8
发布时间 :2004-08-18 00:00:00
修订时间 :2016-10-17 22:45:50
NMCOES    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users and possibly steal authentication information via multiple attack vectors, including the mailbox parameter in compose.php.


[CNNVD]SquirrelMail文件夹名称跨站脚本漏洞(CNNVD-200408-156)

        SquirrelMail 1.4.2存在多个跨站脚本(XSS)漏洞。远程攻击者可以像其他用户一样通过多个包含compose.php邮箱参数的攻击向量来执行任意脚本并窃取身份验证信息。

- CVSS (基础分值)

CVSS分值: 6.8 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:squirrelmail:squirrelmail:1.2.9
cpe:/a:squirrelmail:squirrelmail:1.2.5
cpe:/a:squirrelmail:squirrelmail:1.2.6
cpe:/a:squirrelmail:squirrelmail:1.2.7
cpe:/a:squirrelmail:squirrelmail:1.2.8
cpe:/a:squirrelmail:squirrelmail:1.2.10
cpe:/a:squirrelmail:squirrelmail:1.2.11
cpe:/a:squirrelmail:squirrelmail:1.4
cpe:/a:squirrelmail:squirrelmail:1.2.1
cpe:/a:squirrelmail:squirrelmail:1.0.4
cpe:/a:squirrelmail:squirrelmail:1.2.2
cpe:/a:sgi:propack:3.0SGI ProPack 3.0
cpe:/a:squirrelmail:squirrelmail:1.0.5
cpe:/a:squirrelmail:squirrelmail:1.2.3
cpe:/a:squirrelmail:squirrelmail:1.4.1
cpe:/a:squirrelmail:squirrelmail:1.2.4
cpe:/a:squirrelmail:squirrelmail:1.4.2
cpe:/a:squirrelmail:squirrelmail:1.2.0

- OVAL (用于检测的技术细节)

oval:org.mitre.oval:def:10274Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.2 allow remote attackers to execute arbitrary script as other users ...
oval:org.mitre.oval:def:1006SquirrelMail Cross-site Scripting Vulnerability I
*OVAL详细的描述了检测该漏洞的方法,你可以从相关的OVAL定义中找到更多检测该漏洞的技术细节。

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0519
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0519
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-156
(官方数据源) CNNVD

- 其它链接及资源

ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
(PATCH)  SGI  20040604-01-U
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
(UNKNOWN)  CONECTIVA  CLA-2004:858
http://marc.info/?l=bugtraq&m=108334862800260
(UNKNOWN)  BUGTRAQ  20040429 SquirrelMail Cross Scripting Attacks....
http://rhn.redhat.com/errata/RHSA-2004-240.html
(VENDOR_ADVISORY)  REDHAT  RHSA-2004:240
http://security.gentoo.org/glsa/glsa-200405-16.xml
(VENDOR_ADVISORY)  GENTOO  GLSA-200405-16
http://www.debian.org/security/2004/dsa-535
(VENDOR_ADVISORY)  DEBIAN  DSA-535
http://www.novell.com/linux/security/advisories/2005_19_sr.html
(VENDOR_ADVISORY)  SUSE  SUSE-SR:2005:019
http://www.securityfocus.com/advisories/6827
(VENDOR_ADVISORY)  FEDORA  FEDORA-2004-160
http://www.securityfocus.com/archive/1/361857
(UNKNOWN)  BUGTRAQ  20040430 Re: SquirrelMail Cross Scripting Attacks....
http://www.securityfocus.com/bid/10246
(PATCH)  BID  10246
http://xforce.iss.net/xforce/xfdb/16025
(UNKNOWN)  XF  squirrel-composephp-xss(16025)
https://bugzilla.fedora.us/show_bug.cgi?id=1733
(PATCH)  FEDORA  FEDORA-2004-1733

- 漏洞信息

SquirrelMail文件夹名称跨站脚本漏洞
中危 跨站脚本
2004-08-18 00:00:00 2007-01-02 00:00:00
远程  
        SquirrelMail 1.4.2存在多个跨站脚本(XSS)漏洞。远程攻击者可以像其他用户一样通过多个包含compose.php邮箱参数的攻击向量来执行任意脚本并窃取身份验证信息。

- 公告与补丁

        SquirrelMail 1.4.3 has been released to address this issue.
        Gentoo has released an advisory (GLSA 200405-16) to address this issue. Please see the referenced advisory for more information. Gentoo users can carry out the following commands to upgrade their computers:
        emerge sync
        emerge -pv ">=net-mail/squirrelmail-1.4.3_rc1"
        emerge ">=net-mail/squirrelmail-1.4.3_rc1"
        Gentoo has released an advisory (GLSA 200405-16:02) to address errors in the previous Gentoo advisory. Please see the referenced advisory for more information.
        RedHat has released an advisory (FEDORA-2004-160) to address this and other issues in Fedora Core 2. Please see the referenced advisory for more information.
        RedHat has released an advisory (RHSA-2004:240-06) to address this and other issues in Red Hat Enterprise Linux. Please see the advisory in web references for more information.
        SGI has released a security advisory (20040604-01-U) to address this and other issues in SGI ProPack 3. Please see the referenced advisory for more information.
        Debian has released security advisory DSA 535-1 with fixes to address this issue.
        Conectiva has released a security advisory (CLA-2004:858) to address multiple issues in SquirrelMail. Please see the referenced advisory for more information.
        The Fedora Legacy project has released advisory FLSA:1733 along with fixes to address multiple issues in SquirrelMail for RedHat Linux 9. Please see the referenced advisory for further information.
        SUSE has released a security summary report (SUSE-SR:2005:019) addressing this and other issues. Please see the referenced advisory for further information.
        SquirrelMail SquirrelMail 1.0.4
        
        SquirrelMail SquirrelMail 1.0.5
        
        SquirrelMail SquirrelMail 1.2 .0
        
        SquirrelMail SquirrelMail 1.2.1
        
        SquirrelMail SquirrelMail 1.2.10
        
        SquirrelMail SquirrelMail 1.2.11
        
        SquirrelMail SquirrelMail 1.2.2
        
        SquirrelMail SquirrelMail 1.2.3
        
        SquirrelMail SquirrelMail 1.2.4
        
        SquirrelMail SquirrelMail 1.2.5
        
        SquirrelMail SquirrelMail 1.2.6
        
        SquirrelMail SquirrelMail 1.2.7
        
        SquirrelMail SquirrelMail 1.2.8
        
        SquirrelMail SquirrelMail 1.2.9
        
        SquirrelMail SquirrelMail 1.4
        
        SquirrelMail SquirrelMail 1.4.1
        
        SquirrelMail SquirrelMail 1.4.2
        
        SGI ProPack 3.0
        

  •         SGI patch10083.tar.gz
            ft

- 漏洞信息 (24068)

SquirrelMail 1.4.x Folder Name Cross-Site Scripting Vulnerability (EDBID:24068)
php webapps
2004-04-30 Verified
0 Alvin Alex
N/A [点击下载]
source: http://www.securityfocus.com/bid/10246/info

It has been reported that SquirrelMail is affected by a cross-site scripting vulnerability in the handling of folder name displays. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamic web content.

This issue may allow for theft of cookie-based authentication credentials. Other attacks are also possible.

http://www.example.com/mail/src/compose.php?mailbox="><script>window.alert(document.cookie)</script>		

- 漏洞信息

6337
SquirreMail compose.php Multiple Parameter XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Public

- 漏洞描述

Squirrelmail contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate mailbox variables upon submission to the compose.php script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2004-05-10 2004-05-10
Unknow Unknow

- 解决方案

Upgrade to version 1.4.3 RC1 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

SquirrelMail Folder Name Cross-Site Scripting Vulnerability
Input Validation Error 10246
Yes No
2004-04-30 12:00:00 2009-07-12 04:07:00
Disclosure of this issue is credited to Alvin Alex <alvin_gboy@hotmail.com>.

- 受影响的程序版本

SquirrelMail SquirrelMail 1.4.2
+ MandrakeSoft Corporate Server 3.0 x86_64
+ MandrakeSoft Corporate Server 3.0
+ MandrakeSoft Corporate Server 3.0
+ MandrakeSoft Corporate Server 3.0
+ Red Hat Fedora Core2
+ Red Hat Fedora Core2
+ Red Hat Fedora Core2
SquirrelMail SquirrelMail 1.4.1
SquirrelMail SquirrelMail 1.4
SquirrelMail SquirrelMail 1.2.11
SquirrelMail SquirrelMail 1.2.10
SquirrelMail SquirrelMail 1.2.9
SquirrelMail SquirrelMail 1.2.8
+ Terra Soft Solutions Yellow Dog Linux 3.0
SquirrelMail SquirrelMail 1.2.7
+ RedHat Linux 8.0
SquirrelMail SquirrelMail 1.2.6
+ Debian Linux 3.0 sparc
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 s/390
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 ppc
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mipsel
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 mips
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 m68k
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-64
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 ia-32
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 hppa
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 arm
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0 alpha
+ Debian Linux 3.0
+ Debian Linux 3.0
SquirrelMail SquirrelMail 1.2.5
SquirrelMail SquirrelMail 1.2.4
SquirrelMail SquirrelMail 1.2.3
SquirrelMail SquirrelMail 1.2.2
SquirrelMail SquirrelMail 1.2.1
SquirrelMail SquirrelMail 1.2 .0
SquirrelMail SquirrelMail 1.0.5
SquirrelMail SquirrelMail 1.0.4
SGI ProPack 3.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
RedHat Linux 9.0 i386
SquirrelMail SquirrelMail 1.4.8

- 不受影响的程序版本

SquirrelMail SquirrelMail 1.4.8

- 漏洞讨论

It has been reported that SquirrelMail is affected by a cross-site scripting vulnerability in the handling of folder name displays. This issue is due to a failure of the application to properly sanitize user-supplied input prior to including it in dynamic web content.

This issue may allow for theft of cookie-based authentication credentials. Other attacks are also possible.

- 漏洞利用

No exploit is required to leverage this issue. The following proof of concept has been provided:

http://www.example.com/mail/src/compose.php?mailbox="&gt;&amp;lt;script&amp;gt;window.alert(document.cookie)&amp;lt;/script&amp;gt;

- 解决方案

SquirrelMail 1.4.3 has been released to address this issue.

Gentoo has released an advisory (GLSA 200405-16) to address this issue. Please see the referenced advisory for more information. Gentoo users can carry out the following commands to upgrade their computers:
emerge sync
emerge -pv ">=net-mail/squirrelmail-1.4.3_rc1"
emerge ">=net-mail/squirrelmail-1.4.3_rc1"

Gentoo has released an advisory (GLSA 200405-16:02) to address errors in the previous Gentoo advisory. Please see the referenced advisory for more information.

RedHat has released an advisory (FEDORA-2004-160) to address this and other issues in Fedora Core 2. Please see the referenced advisory for more information.

RedHat has released an advisory (RHSA-2004:240-06) to address this and other issues in Red Hat Enterprise Linux. Please see the advisory in web references for more information.

SGI has released a security advisory (20040604-01-U) to address this and other issues in SGI ProPack 3. Please see the referenced advisory for more information.

Debian has released security advisory DSA 535-1 with fixes to address this issue.

Conectiva has released a security advisory (CLA-2004:858) to address multiple issues in SquirrelMail. Please see the referenced advisory for more information.

The Fedora Legacy project has released advisory FLSA:1733 along with fixes to address multiple issues in SquirrelMail for RedHat Linux 9. Please see the referenced advisory for further information.

SUSE has released a security summary report (SUSE-SR:2005:019) addressing this and other issues. Please see the referenced advisory for further information.


SquirrelMail SquirrelMail 1.0.4

SquirrelMail SquirrelMail 1.0.5

SquirrelMail SquirrelMail 1.2 .0

SquirrelMail SquirrelMail 1.2.1

SquirrelMail SquirrelMail 1.2.10

SquirrelMail SquirrelMail 1.2.11

SquirrelMail SquirrelMail 1.2.2

SquirrelMail SquirrelMail 1.2.3

SquirrelMail SquirrelMail 1.2.4

SquirrelMail SquirrelMail 1.2.5

SquirrelMail SquirrelMail 1.2.6

SquirrelMail SquirrelMail 1.2.7

SquirrelMail SquirrelMail 1.2.8

SquirrelMail SquirrelMail 1.2.9

SquirrelMail SquirrelMail 1.4

SquirrelMail SquirrelMail 1.4.1

SquirrelMail SquirrelMail 1.4.2

SGI ProPack 3.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站