Description
|
|
Multiple vulnerabilities have been identified in SquirrelMail, which may be exploited by attackers to execute arbitrary scripting code.
The first issue is due to input validation errors in the "webmail.php" and "compose.php" scripts that do not validate the "mailto", "session" and "delete_draft" parameters, which could be exploited by attackers to cause arbitrary scripting code to be executed by the user's browser in the security context of an affected Web site.
The second vulnerability is due to an input validation error in the magicHTML filter, which could be exploited to conduct cross site scripting attacks.
The third flaw is due to an error when displaying attached files in Internet Explorer, which could be exploited by attackers to execute arbitrary scripting code via malicious attachments with a specially crafted MIME header.
|