Description
|
|
A vulnerability was identified in SquirrelMail, which could be exploited by malicious users to conduct cross site scripting attacks or gain unauthorized access. This flaw is due to an input validation error in the "options_identities.php" file that does not properly filter the "$_POST" variable, which could be exploited by attackers to change other people's preferences, conduct cross site scripting attacks and write arbitrary files on a vulnerable system.
|