CVE-2007-1262
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
11/05/2007
Last modified:
09/04/2025
Description
Multiple cross-site scripting (XSS) vulnerabilities in the HTML filter in SquirrelMail 1.4.0 through 1.4.9a allow remote attackers to inject arbitrary web script or HTML via the (1) data: URI in an HTML e-mail attachment or (2) various non-ASCII character sets that are not properly filtered when viewed with Microsoft Internet Explorer.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.3a:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://docs.info.apple.com/article.html?artnum=306172
- http://jvn.jp/en/jp/JVN09157962/index.html
- http://jvndb.jvn.jp/ja/contents/2007/JVNDB-2007-000398.html
- http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
- http://osvdb.org/35887
- http://osvdb.org/35888
- http://secunia.com/advisories/25200
- http://secunia.com/advisories/25236
- http://secunia.com/advisories/25320
- http://secunia.com/advisories/25690
- http://secunia.com/advisories/25787
- http://secunia.com/advisories/26235
- http://www.debian.org/security/2007/dsa-1290
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A106
- http://www.novell.com/linux/security/advisories/2007_13_sr.html
- http://www.securityfocus.com/bid/23910
- http://www.securityfocus.com/bid/25159
- http://www.securitytracker.com/id?1018033=
- http://www.squirrelmail.org/security/issue/2007-05-09
- http://www.vupen.com/english/advisories/2007/1748
- http://www.vupen.com/english/advisories/2007/2732
- https://issues.rpath.com/browse/RPL-1353
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11712
- https://rhn.redhat.com/errata/RHSA-2007-0358.html
- http://docs.info.apple.com/article.html?artnum=306172
- http://jvn.jp/en/jp/JVN09157962/index.html
- http://jvndb.jvn.jp/ja/contents/2007/JVNDB-2007-000398.html
- http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
- http://osvdb.org/35887
- http://osvdb.org/35888
- http://secunia.com/advisories/25200
- http://secunia.com/advisories/25236
- http://secunia.com/advisories/25320
- http://secunia.com/advisories/25690
- http://secunia.com/advisories/25787
- http://secunia.com/advisories/26235
- http://www.debian.org/security/2007/dsa-1290
- http://www.mandriva.com/security/advisories?name=MDKSA-2007%3A106
- http://www.novell.com/linux/security/advisories/2007_13_sr.html
- http://www.securityfocus.com/bid/23910
- http://www.securityfocus.com/bid/25159
- http://www.securitytracker.com/id?1018033=
- http://www.squirrelmail.org/security/issue/2007-05-09
- http://www.vupen.com/english/advisories/2007/1748
- http://www.vupen.com/english/advisories/2007/2732
- https://issues.rpath.com/browse/RPL-1353
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11712
- https://rhn.redhat.com/errata/RHSA-2007-0358.html



