Show filters
31 Total Results
Displaying 1-10 of 31
Sort by:
Attacker Value
Very Low
CVE-2020-14932
Disclosure Date: June 20, 2020 (last updated February 21, 2025)
compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
0
Attacker Value
Very Low
CVE-2020-14933
Disclosure Date: June 20, 2020 (last updated February 21, 2025)
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
0
Attacker Value
Unknown
CVE-2018-8741
Disclosure Date: March 17, 2018 (last updated November 08, 2023)
A directory traversal flaw in SquirrelMail 1.4.22 allows an authenticated attacker to exfiltrate (or potentially delete) files from the hosting server, related to ../ in the att_local_name field in Deliver.class.php.
0
Attacker Value
Unknown
CVE-2017-7692
Disclosure Date: April 20, 2017 (last updated November 26, 2024)
SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. Hence, if the target server uses sendmail and SquirrelMail is configured to use it as a command-line program, it's possible to trick sendmail into using an attacker-provided configuration file that triggers the execution of an arbitrary command. For exploitation, the attacker must upload a sendmail.cf file as an email attachment, and inject the …
0
Attacker Value
Unknown
CVE-2011-2752
Disclosure Date: July 17, 2011 (last updated October 04, 2023)
CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555.
0
Attacker Value
Unknown
CVE-2011-2753
Disclosure Date: July 17, 2011 (last updated October 04, 2023)
Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555.
0
Attacker Value
Unknown
CVE-2010-4554
Disclosure Date: July 14, 2011 (last updated October 04, 2023)
functions/page_header.php in SquirrelMail 1.4.21 and earlier does not prevent page rendering inside a frame in a third-party HTML document, which makes it easier for remote attackers to conduct clickjacking attacks via a crafted web site.
0
Attacker Value
Unknown
CVE-2010-4555
Disclosure Date: July 14, 2011 (last updated October 04, 2023)
Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the SquirrelSpell spellchecking plugin, and (3) errors associated with the Index Order (aka options_order) page.
0
Attacker Value
Unknown
CVE-2011-2023
Disclosure Date: July 14, 2011 (last updated October 04, 2023)
Cross-site scripting (XSS) vulnerability in functions/mime.php in SquirrelMail before 1.4.22 allows remote attackers to inject arbitrary web script or HTML via a crafted STYLE element in an e-mail message.
0
Attacker Value
Unknown
CVE-2010-2813
Disclosure Date: August 19, 2010 (last updated October 04, 2023)
functions/imap_general.php in SquirrelMail before 1.4.21 does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preferences files.
0