[34736] in bugtraq

home help back first fref pref prev next nref lref last post

Re: SquirrelMail Cross Scripting Attacks....

daemon@ATHENA.MIT.EDU (Jonathan Angliss)
Fri Apr 30 17:44:05 2004

Date: Fri, 30 Apr 2004 15:22:47 -0500
From: Jonathan Angliss <jon@squirrelmail.org>
Message-ID: <241565456.20040430152247@netdork.net>
To: Alvin Alex <alvin_gboy@hotmail.com>
Cc: bugtraq@securityfocus.com
In-Reply-To: <20040429210906.31136.qmail@www.securityfocus.com>
MIME-Version: 1.0
Content-Type: text/plain; charset=us-ascii
Content-Transfer-Encoding: 7bit

Hello Alvin,
On Thursday, April 29, 2004, Alvin Alex wrote...

> SquirrelMail latest version (although is tested on version 1.4.2) is
> prone to many cross scripting attacks that can be used to steal user
> cookies.

[..]

> Squirrel Mail Coders have been informed of this vulnerability but
> the vulnerability still exists in their latest version.

PLEASE in future notify us before posting bug reports so we can ensure
a fix is in place... The 1.4.3 release which will be out shortly will
fix this issue, along with a number of other XSS issues. While we had
been notified of the issue, we were holding off on announcing the
issue until a fix was in place.

-- 
Jonathan Angliss
(jon@squirrelmail.org)


home help back first fref pref prev next nref lref last post