Vulnerability Details : CVE-2006-6142
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.0 through 1.4.9 allow remote attackers to inject arbitrary web script or HTML via the (1) mailto parameter in (a) webmail.php, the (2) session and (3) delete_draft parameters in (b) compose.php, and (4) unspecified vectors involving "a shortcoming in the magicHTML filter."
Vulnerability category: Cross site scripting (XSS)
Products affected by CVE-2006-6142
- cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:*
- cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2006-6142
2.44%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 90 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-6142
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.8
|
MEDIUM | AV:N/AC:M/Au:N/C:P/I:P/A:P |
8.6
|
6.4
|
NIST |
Vendor statements for CVE-2006-6142
-
Red Hat 2007-03-14Red Hat Enterprise Linux 5 is not vulnerable to this issue as it contains a backported patch.
References for CVE-2006-6142
-
http://www.novell.com/linux/security/advisories/2006_29_sr.html
404 Page Not Found | SUSE
-
http://docs.info.apple.com/article.html?artnum=306172
-
http://www.vupen.com/english/advisories/2006/4828
-
http://www.securityfocus.com/bid/25159
-
http://sourceforge.net/project/shownotes.php?release_id=468482
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30694
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30693
-
http://fedoranews.org/cms/node/2438
-
http://www.novell.com/linux/security/advisories/2007_4_sr.html
404 Page Not Found | SUSE
-
http://squirrelmail.org/security/issue/2006-12-02
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/30695
-
http://www.debian.org/security/2006/dsa-1241
-
http://www.vupen.com/english/advisories/2007/2732
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.redhat.com/support/errata/RHSA-2007-0022.html
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:226
-
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
-
http://securitytracker.com/id?1017327
-
http://fedoranews.org/cms/node/2439
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9988
-
http://www.securityfocus.com/bid/21414
-
ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
-
https://issues.rpath.com/browse/RPL-849
Jump to