[23980] in bugtraq

home help back first fref pref prev next nref lref last post

Re: squirrelmail bug

daemon@ATHENA.MIT.EDU (Konstantin Riabitsev)
Thu Jan 24 17:33:43 2002

Date: 24 Jan 2002 21:20:44 -0000
Message-ID: <20020124212044.346.qmail@mail.securityfocus.com>
Content-Type: text/plain
Content-Disposition: inline
Content-Transfer-Encoding: binary
MIME-Version: 1.0
From: Konstantin Riabitsev <icon@phy.duke.edu>
To: bugtraq@securityfocus.com


In-Reply-To: <1176.213.134.140.130.1011887757.squirrel@mail.bsquad.sm.pl>

For future reference: 

Please be cool -- first notify the authors of the
package before posting to bugtraq. This is the
generally accepted etiquette for handling the
security-related bugs and allows developers to
come up with the fix before the problem is widely
known.

Here is the fix for the arbitrary remote execution
with httpd-user rights. Place this file in the
squirrelmail/plugins/squirrelspell directory and
execute it to fix the vulnerability.

--- begin sqspell_security_fix.sh ---
#!/bin/sh
sed "s/.mod.php/.mod/g" sqspell_interface.php > tmp.1
sed "s/.mod.php/.mod/g" sqspell_options.php > tmp.2
mv -f tmp.1 sqspell_interface.php
mv -f tmp.2 sqspell_options.php
cd modules
for FILE in *.mod.php; do 
        NEWFILE=`echo $FILE | sed 's/.php//'`
        mv $FILE $NEWFILE
done
--- end sqspell_security_fix.sh ---

http://www.dulug.duke.edu/~icon/misc/security_fix.sh.txt

squirrelmail-1.2.4 will contain the fix and should
be released shortly.

Regards,
-- 
Konstantin Riabitsev

home help back first fref pref prev next nref lref last post