CVE-2006-6142
Gravedad CVSS v2.0:
MEDIA
Tipo:
No Disponible / Otro tipo
Fecha de publicación:
05/12/2006
Última modificación:
09/04/2025
Descripción
Múltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en SquirrelMail 1.4.0 hasta 1.4.9 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elección mediante el (1) parámetro mailto en (a) webmail.php, los parámetros (2) session y (3) delete_draft en (b) compose.php, y (4) vectores no especificados implicando "a shortcoming in the magicHTML filter."
Impacto
Puntuación base 2.0
6.80
Gravedad 2.0
MEDIA
Productos y versiones vulnerables
CPE | Desde | Hasta |
---|---|---|
cpe:2.3:a:squirrelmail:squirrelmail:1.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.1:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.2:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_r3:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3_rc1:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.3aa:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.4_rc1:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.5:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_cvs:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.6_rc1:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4.7:*:*:*:*:*:*:* | ||
cpe:2.3:a:squirrelmail:squirrelmail:1.4_rc1:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://docs.info.apple.com/article.html?artnum=306172
- http://fedoranews.org/cms/node/2438
- http://fedoranews.org/cms/node/2439
- http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
- http://secunia.com/advisories/23195
- http://secunia.com/advisories/23322
- http://secunia.com/advisories/23409
- http://secunia.com/advisories/23504
- http://secunia.com/advisories/23811
- http://secunia.com/advisories/24004
- http://secunia.com/advisories/24284
- http://secunia.com/advisories/26235
- http://securitytracker.com/id?1017327=
- http://sourceforge.net/project/shownotes.php?release_id=468482
- http://squirrelmail.org/security/issue/2006-12-02
- http://www.debian.org/security/2006/dsa-1241
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A226
- http://www.novell.com/linux/security/advisories/2006_29_sr.html
- http://www.novell.com/linux/security/advisories/2007_4_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0022.html
- http://www.securityfocus.com/bid/21414
- http://www.securityfocus.com/bid/25159
- http://www.vupen.com/english/advisories/2006/4828
- http://www.vupen.com/english/advisories/2007/2732
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30693
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30694
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30695
- https://issues.rpath.com/browse/RPL-849
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9988
- ftp://patches.sgi.com/support/free/security/advisories/20070201-01-P.asc
- http://docs.info.apple.com/article.html?artnum=306172
- http://fedoranews.org/cms/node/2438
- http://fedoranews.org/cms/node/2439
- http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html
- http://secunia.com/advisories/23195
- http://secunia.com/advisories/23322
- http://secunia.com/advisories/23409
- http://secunia.com/advisories/23504
- http://secunia.com/advisories/23811
- http://secunia.com/advisories/24004
- http://secunia.com/advisories/24284
- http://secunia.com/advisories/26235
- http://securitytracker.com/id?1017327=
- http://sourceforge.net/project/shownotes.php?release_id=468482
- http://squirrelmail.org/security/issue/2006-12-02
- http://www.debian.org/security/2006/dsa-1241
- http://www.mandriva.com/security/advisories?name=MDKSA-2006%3A226
- http://www.novell.com/linux/security/advisories/2006_29_sr.html
- http://www.novell.com/linux/security/advisories/2007_4_sr.html
- http://www.redhat.com/support/errata/RHSA-2007-0022.html
- http://www.securityfocus.com/bid/21414
- http://www.securityfocus.com/bid/25159
- http://www.vupen.com/english/advisories/2006/4828
- http://www.vupen.com/english/advisories/2007/2732
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30693
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30694
- https://exchange.xforce.ibmcloud.com/vulnerabilities/30695
- https://issues.rpath.com/browse/RPL-849
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9988