Vulnerability CVE-2005-2095


Published: 2005-07-13   Modified: 2012-02-12

Description:
options_identities.php in SquirrelMail 1.4.4 and earlier uses the extract function to process the $_POST variable, which allows remote attackers to modify or read the preferences of other users, conduct cross-site scripting XSS) attacks, and write arbitrary files.

See advisories in our WLB2 database:
Topic
Author
Date
High
SquirrelMail < 1.4.5-RC1 Arbitrary Variable Overwrite
GulfTech
20.01.2018

CVSS2 => (AV:N/AC:M/Au:N/C:P/I:N/A:N)

CVSS Base Score
Impact Subscore
Exploitability Subscore
4.3/10
2.9/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Partial
None
None
Affected software
Squirrelmail -> Squirrelmail 

 References:
http://www.debian.org/security/2005/dsa-756
https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=163047
http://xforce.iss.net/xforce/xfdb/21359
http://www.squirrelmail.org/security/issue/2005-07-13
http://www.securityfocus.com/bid/14254
http://www.securityfocus.com/archive/1/405202
http://www.securityfocus.com/archive/1/405200
http://www.redhat.com/support/errata/RHSA-2005-595.html
http://www.novell.com/linux/security/advisories/2005_18_sr.html
http://www.gulftech.org/?node=research&article_id=00090-07142005
http://oval.mitre.org/repository/data/getDef?id=oval:org.mitre.oval:def:10500
http://lists.apple.com/archives/security-announce/2005/Aug/msg00000.html
http://lists.apple.com/archives/security-announce/2005//Aug/msg00001.html

Copyright 2024, cxsecurity.com

 

Back to Top