SquirrelMail 1.4.22

CPE Details

SquirrelMail 1.4.22
1.4.22
2019-06-14
13h08 +00:00
2019-06-14
13h08 +00:00
Alerte pour un CPE
Restez informé de toutes modifications pour un CPE spécifique.
Gestion des notifications

CPE Name: cpe:2.3:a:squirrelmail:squirrelmail:1.4.22:*:*:*:*:*:*:*

Informations

Vendor

squirrelmail

Product

squirrelmail

Version

1.4.22

Related CVE

Open and find in CVE List

CVE ID Publié Description Score Gravité
CVE-2020-14932 2020-06-20 10h07 +00:00 compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
9.8
Critique
CVE-2020-14933 2020-06-20 10h07 +00:00 compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
8.8
Haute
CVE-2019-12970 2019-07-01 08h32 +00:00 XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
6.1
Moyen
CVE-2018-14950 2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via a "6.1
Moyen
CVE-2018-14951 2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via a "
CVE-2018-14952
2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via a "6.1
Moyen
CVE-2018-14953 2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via a "6.1
Moyen
CVE-2018-14954 2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via the formaction attribute.
6.1
Moyen
CVE-2018-14955 2018-08-05 16h00 +00:00 The mail message display page in SquirrelMail through 1.4.22 has XSS via SVG animations (animate to attribute).
6.1
Moyen
CVE-2018-8741 2018-03-17 13h00 +00:00 A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
8.8
Haute
CVE-2017-7692 2017-04-20 12h00 +00:00 SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the sendmail.cf filename with the -C option within the "Options > Personal Informations > Email Address" setting.
8.8
Haute
CVE-2009-1578 2009-05-14 15h00 +00:00 Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail before 1.4.18 and NaSMail before 1.7 allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) certain encrypted strings in e-mail headers, related to contrib/decrypt_headers.php; (2) PHP_SELF; and (3) the query string (aka QUERY_STRING).
4.3
CVE-2009-1579 2009-05-14 15h00 +00:00 The map_yp_alias function in functions/imap_general.php in SquirrelMail before 1.4.18 and NaSMail before 1.7 allows remote attackers to execute arbitrary commands via shell metacharacters in a username string that is used by the ypmatch program.
6.8
CVE-2009-1581 2009-05-14 15h00 +00:00 functions/mime.php in SquirrelMail before 1.4.18 does not protect the application's content from Cascading Style Sheets (CSS) positioning in HTML e-mail messages, which allows remote attackers to spoof the user interface, and conduct cross-site scripting (XSS) and phishing attacks, via a crafted message.
4.3
CVE-2006-3174 2006-06-22 22h00 +00:00 Cross-site scripting (XSS) vulnerability in search.php in SquirrelMail 1.5.1 and earlier, when register_globals is enabled, allows remote attackers to inject arbitrary HTML via the mailbox parameter.
2.6