Vulnerabilidad en plugin Mail Fetch para SquirrelMail (CVE-2010-1637)
Gravedad CVSS v3.1:
MEDIA
Tipo:
CWE-918
Falsificación de solicitud en servidor (SSRF)
Fecha de publicación:
22/06/2010
Última modificación:
11/04/2025
Descripción
El plugin Mail Fetch en SquirrelMail 1.4.20 y versiones anteriores, permite a atacantes remotos autenticados eludir las restricciones del firewall y usar SquirrelMail como un proxy para escanear redes internas mediante un número de puerto POP3 modificado.
Impacto
Puntuación base 3.x
6.50
Gravedad 3.x
MEDIA
Puntuación base 2.0
4.00
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* | 1.4.20 (incluyendo) | |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.6.8 (excluyendo) | |
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* | 10.6.8 (excluyendo) | |
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://secunia.com/advisories/40307
- http://squirrelmail.org/security/issue/2010-06-21
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951
- http://support.apple.com/kb/HT5130
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A120
- http://www.openwall.com/lists/oss-security/2010/05/25/3
- http://www.openwall.com/lists/oss-security/2010/05/25/9
- http://www.openwall.com/lists/oss-security/2010/06/21/1
- http://www.securityfocus.com/bid/40291
- http://www.securityfocus.com/bid/40307
- http://www.vupen.com/english/advisories/2010/1535
- http://www.vupen.com/english/advisories/2010/1536
- http://www.vupen.com/english/advisories/2010/1554
- http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://secunia.com/advisories/40307
- http://squirrelmail.org/security/issue/2010-06-21
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951
- http://support.apple.com/kb/HT5130
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A120
- http://www.openwall.com/lists/oss-security/2010/05/25/3
- http://www.openwall.com/lists/oss-security/2010/05/25/9
- http://www.openwall.com/lists/oss-security/2010/06/21/1
- http://www.securityfocus.com/bid/40291
- http://www.securityfocus.com/bid/40307
- http://www.vupen.com/english/advisories/2010/1535
- http://www.vupen.com/english/advisories/2010/1536
- http://www.vupen.com/english/advisories/2010/1554