Description
|
|
Several vulnerabilities were reported in SquirrelMail, which could be exploited by attackers to include arbitrary code or inject HTML scripts. The first flaw resides in the "prefs.php" script which can allow an attacker to provide a specially crafted URL that could include local files into the SquirrelMail code. The second vulnerability is due to an insufficient checking of incoming URL vars in the "src/webmail.php" file, which may allow attackers to include arbitrary remote web pages in the SquirrelMail frameset. The third issue results from an insufficient escaping of integer variables in "src/webmail.php" and can be exploited to inject HTML/script-code into a SquirrelMail webpage.
|