Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2019-12970

Published: 1 July 2019

XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.

From the Ubuntu Security Team

It was discovered a XSS vulnerability in SquirrelMail. An attacker could use malicious script content from HTML e-mail to execute code and/or provoke a denial of service.

Priority

Medium

Cvss 3 Severity Score

6.1

Score breakdown

Status

Package Release Status
squirrelmail
Launchpad, Ubuntu, Debian
bionic Does not exist

cosmic Does not exist

disco Does not exist

eoan Does not exist

focal Does not exist

groovy Does not exist

trusty
Released (2:1.4.23~svn20120406-2+deb8u3ubuntu0.14.04.1~esm1)
Available with Ubuntu Pro or Ubuntu Pro (Infra-only)
upstream
Released (2:1.4.23~svn20120406-2+deb8u4)
xenial
Released (2:1.4.23~svn20120406-2+deb8u3ubuntu0.16.04.2)

Severity score breakdown

Parameter Value
Base score 6.1
Attack vector Network
Attack complexity Low
Privileges required None
User interaction Required
Scope Changed
Confidentiality Low
Integrity impact Low
Availability impact None
Vector CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N