CVE-2010-1637
Severity CVSS v4.0:
Pending analysis
Type:
CWE-918
Server-Side Request Forgery (SSRF)
Publication date:
22/06/2010
Last modified:
11/04/2025
Description
The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
Impact
Base Score 3.x
6.50
Severity 3.x
MEDIUM
Base Score 2.0
4.00
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* | 1.4.20 (including) | |
cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:* | ||
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:* | ||
cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:* | 10.6.8 (excluding) | |
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:* | 10.6.8 (excluding) | |
cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:* | ||
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://secunia.com/advisories/40307
- http://squirrelmail.org/security/issue/2010-06-21
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951
- http://support.apple.com/kb/HT5130
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A120
- http://www.openwall.com/lists/oss-security/2010/05/25/3
- http://www.openwall.com/lists/oss-security/2010/05/25/9
- http://www.openwall.com/lists/oss-security/2010/06/21/1
- http://www.securityfocus.com/bid/40291
- http://www.securityfocus.com/bid/40307
- http://www.vupen.com/english/advisories/2010/1535
- http://www.vupen.com/english/advisories/2010/1536
- http://www.vupen.com/english/advisories/2010/1554
- http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69
- http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html
- http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html
- http://rhn.redhat.com/errata/RHSA-2012-0103.html
- http://secunia.com/advisories/40307
- http://squirrelmail.org/security/issue/2010-06-21
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951
- http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951
- http://support.apple.com/kb/HT5130
- http://www.mandriva.com/security/advisories?name=MDVSA-2010%3A120
- http://www.openwall.com/lists/oss-security/2010/05/25/3
- http://www.openwall.com/lists/oss-security/2010/05/25/9
- http://www.openwall.com/lists/oss-security/2010/06/21/1
- http://www.securityfocus.com/bid/40291
- http://www.securityfocus.com/bid/40307
- http://www.vupen.com/english/advisories/2010/1535
- http://www.vupen.com/english/advisories/2010/1536
- http://www.vupen.com/english/advisories/2010/1554