compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
Max CVSS
8.8
EPSS Score
0.10%
Published
2020-06-20
Updated
2024-04-11
compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
Max CVSS
9.8
EPSS Score
0.46%
Published
2020-06-20
Updated
2020-06-26
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
Max CVSS
6.1
EPSS Score
1.25%
Published
2019-07-01
Updated
2019-07-30
The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<math><maction xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<form action='data:text" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
The mail message display page in SquirrelMail through 1.4.22 has XSS via a "<svg><a xlink:href=" attack.
Max CVSS
6.1
EPSS Score
0.20%
Published
2018-08-05
Updated
2019-08-15
A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
Max CVSS
8.8
EPSS Score
0.35%
Published
2018-03-17
Updated
2019-08-15
SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the sendmail.cf filename with the -C option within the "Options > Personal Informations > Email Address" setting.
Max CVSS
9.0
EPSS Score
7.46%
Published
2017-04-20
Updated
2017-11-04
Squirrelmail 4.0 uses the outdated MD5 hash algorithm for passwords.
Max CVSS
7.5
EPSS Score
0.17%
Published
2020-02-13
Updated
2020-03-10
functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preference files. NOTE: this issue exists because of an incorrect fix for CVE-2010-2813.
Max CVSS
5.0
EPSS Score
0.76%
Published
2013-01-18
Updated
2023-02-13
Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555.
Max CVSS
6.8
EPSS Score
0.30%
Published
2011-07-17
Updated
2017-08-29
CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555.
Max CVSS
5.8
EPSS Score
0.99%
Published
2011-07-17
Updated
2017-08-29
functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preferences files.
Max CVSS
5.0
EPSS Score
11.47%
Published
2010-08-19
Updated
2017-08-17
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
Max CVSS
6.5
EPSS Score
0.32%
Published
2010-06-22
Updated
2024-02-08
Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.19 and earlier, and NaSMail before 1.7, allow remote attackers to hijack the authentication of unspecified victims via features such as send message and change preferences, related to (1) functions/mailbox_display.php, (2) src/addrbook_search_html.php, (3) src/addressbook.php, (4) src/compose.php, (5) src/folders.php, (6) src/folders_create.php, (7) src/folders_delete.php, (8) src/folders_rename_do.php, (9) src/folders_rename_getname.php, (10) src/folders_subscribe.php, (11) src/move_messages.php, (12) src/options.php, (13) src/options_highlight.php, (14) src/options_identities.php, (15) src/options_order.php, (16) src/search.php, and (17) src/vcard.php.
Max CVSS
6.8
EPSS Score
0.40%
Published
2009-08-25
Updated
2017-09-19
Session fixation vulnerability in SquirrelMail before 1.4.18 allows remote attackers to hijack web sessions via a crafted cookie.
Max CVSS
5.8
EPSS Score
0.57%
Published
2009-05-14
Updated
2017-09-29
The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
Max CVSS
6.8
EPSS Score
1.60%
Published
2009-05-14
Updated
2017-09-29
The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.19-1 on Debian GNU/Linux, and possibly other operating systems and versions, allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program. NOTE: this issue exists because of an incomplete fix for CVE-2009-1579.
Max CVSS
6.8
EPSS Score
4.26%
Published
2009-05-22
Updated
2023-02-13
A certain Red Hat patch for SquirrelMail 1.4.8 sets the same SQMSESSID cookie value for all sessions, which allows remote authenticated users to access other users' folder lists and configuration data in opportunistic circumstances by using the standard webmail.php interface. NOTE: this vulnerability exists because of an incorrect fix for CVE-2008-3663.
Max CVSS
6.5
EPSS Score
0.50%
Published
2009-01-21
Updated
2023-02-13
Squirrelmail 1.4.15 does not set the secure flag for the session cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Max CVSS
5.0
EPSS Score
0.46%
Published
2008-09-24
Updated
2018-10-11
SquirrelMail 1.4.11 and 1.4.12, as distributed on sourceforge.net before 20071213, has been externally modified to create a Trojan Horse that introduces a PHP remote file inclusion vulnerability, which allows remote attackers to execute arbitrary code.
Max CVSS
6.8
EPSS Score
9.42%
Published
2007-12-14
Updated
2018-10-15
The G/PGP (GPG) Plugin 2.0, and 2.1dev before 20060912, for Squirrelmail allows remote attackers to execute arbitrary commands via shell metacharacters in the messageSignedText parameter to the gpg_check_sign_pgp_mime function in gpg_hook_functions.php. NOTE: a parameter value can be set in the contents of an e-mail message.
Max CVSS
7.5
EPSS Score
1.54%
Published
2007-07-15
Updated
2017-07-29
53 vulnerabilities found
1 2 3
This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!