{"vuid":"VU#153043","idnumber":"153043","name":"SquirrelMail compose.php script does not adequately validate input thereby allowing arbitrary user to send messages","keywords":["SquirrelMail","compose.php","user input","arbitrary user","send message","mail spam","mail spoofing"],"overview":"Some versions of SquirrelMail do not properly validate input. Attackers can spoof email addresses through this vulnerability.","clean_desc":"SquirrelMail is a collection of PHP4 scripts that provides webmail services. Prior to version 1.24, SquirrelMail does not properly validate Universal Resource Identifiers (URI's) and JavaScript code embedded in HTML tags within an email message. These tags are sent by SquirrelMail to the user's web browser, which could make the browser request the embedded URI's or execute the JavaScript code.","impact":"An attacker could craft an email message to a SquirrelMail user which, when read by the user, could automatically send email from the user's account to any address of the attacker's choice. This vulnerability could also be used in a cross-site scripting attack to hijack an authenticated user's session.","resolution":"Upgrade SquirrelMail to version 1.2.4 or later, available from: http://www.squirrelmail.org/download.php","workarounds":"","sysaffected":"","thanks":"Thanks to Tom McAdam for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.securityfocus.com/bid/3956","http://xforce.iss.net/xforce/xfdb/7989","http://www.squirrelmail.org/"],"cveids":["CVE-2002-1648"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2002-01-26T23:30:40Z","publicdate":"2002-01-24T00:00:00Z","datefirstpublished":"2002-05-30T21:06:00Z","dateupdated":"2007-05-10T17:06:20Z","revision":12,"vrda_d1_directreport":"0","vrda_d1_population":"2","vrda_d1_impact":"2","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"4","cam_population":"2","cam_impact":"5","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"1.06875","cam_scorecurrentwidelyknown":"1.35","cam_scorecurrentwidelyknownexploited":"2.475","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.06875,"vulnote":null}