Your submission was sent successfully! Close

CVE-2010-4555

Published: 14 July 2011

Multiple cross-site scripting (XSS) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to inject arbitrary web script or HTML via vectors involving (1) drop-down selection lists, (2) the > (greater than) character in the SquirrelSpell spellchecking plugin, and (3) errors associated with the Index Order (aka options_order) page.

Priority

Low

Status

Package Release Status
squirrelmail
Launchpad, Ubuntu, Debian
hardy Ignored
(reached end-of-life)
lucid Ignored
(reached end-of-life)
maverick Ignored
(reached end-of-life)
natty Ignored
(reached end-of-life)
oneiric Not vulnerable
(2:1.4.22-1)
precise Not vulnerable
(2:1.4.22-1)
quantal Not vulnerable
(2:1.4.22-1)
raring Not vulnerable
(2:1.4.22-1)
saucy Not vulnerable
(2:1.4.22-1)
trusty Not vulnerable
(2:1.4.22-1)
upstream
Released (1.4.22)
Patches:
upstream: http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119