[23980] in bugtraq
Re: squirrelmail bug
daemon@ATHENA.MIT.EDU (Konstantin Riabitsev)
Thu Jan 24 17:33:43 2002
Date: 24 Jan 2002 21:20:44 -0000
Message-ID: <20020124212044.346.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Konstantin Riabitsev <icon@phy.duke.edu>
To: bugtraq@securityfocus.com
In-Reply-To: <1176.213.134.140.130.1011887757.squirrel@mail.bsquad.sm.pl>
For future reference:
Please be cool -- first notify the authors of the
package before posting to bugtraq. This is the
generally accepted etiquette for handling the
security-related bugs and allows developers to
come up with the fix before the problem is widely
known.
Here is the fix for the arbitrary remote execution
with httpd-user rights. Place this file in the
squirrelmail/plugins/squirrelspell directory and
execute it to fix the vulnerability.
--- begin sqspell_security_fix.sh ---
#!/bin/sh
sed "s/.mod.php/.mod/g" sqspell_interface.php > tmp.1
sed "s/.mod.php/.mod/g" sqspell_options.php > tmp.2
mv -f tmp.1 sqspell_interface.php
mv -f tmp.2 sqspell_options.php
cd modules
for FILE in *.mod.php; do
NEWFILE=`echo $FILE | sed 's/.php//'`
mv $FILE $NEWFILE
done
--- end sqspell_security_fix.sh ---
http://www.dulug.duke.edu/~icon/misc/security_fix.sh.txt
squirrelmail-1.2.4 will contain the fix and should
be released shortly.
Regards,
--
Konstantin Riabitsev