CVE-2004-0521
Severity CVSS v4.0:
Pending analysis
Type:
Unavailable / Other
Publication date:
18/08/2004
Last modified:
03/04/2025
Description
SQL injection vulnerability in SquirrelMail before 1.4.3 RC1 allows remote attackers to execute unauthorized SQL statements, with unknown impact, probably via abook_database.php.
Impact
Base Score 2.0
10.00
Severity 2.0
HIGH
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:sgi:propack:3.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:1.2.11:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
- http://marc.info/?l=squirrelmail-cvs&m=108309375029888
- http://marc.info/?l=squirrelmail-cvs&m=108532891231712
- http://rhn.redhat.com/errata/RHSA-2004-240.html
- http://secunia.com/advisories/11685
- http://secunia.com/advisories/11686
- http://secunia.com/advisories/11870
- http://secunia.com/advisories/12289
- http://security.gentoo.org/glsa/glsa-200405-16.xml
- http://www.ciac.org/ciac/bulletins/o-212.shtml
- http://www.debian.org/security/2004/dsa-535
- http://www.osvdb.org/6841
- http://www.securityfocus.com/advisories/6827
- http://www.securityfocus.com/advisories/7148
- http://www.securityfocus.com/bid/10397
- https://bugzilla.fedora.us/show_bug.cgi?id=1733
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16235
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1033
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11446
- ftp://patches.sgi.com/support/free/security/advisories/20040604-01-U.asc
- http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000858
- http://marc.info/?l=squirrelmail-cvs&m=108309375029888
- http://marc.info/?l=squirrelmail-cvs&m=108532891231712
- http://rhn.redhat.com/errata/RHSA-2004-240.html
- http://secunia.com/advisories/11685
- http://secunia.com/advisories/11686
- http://secunia.com/advisories/11870
- http://secunia.com/advisories/12289
- http://security.gentoo.org/glsa/glsa-200405-16.xml
- http://www.ciac.org/ciac/bulletins/o-212.shtml
- http://www.debian.org/security/2004/dsa-535
- http://www.osvdb.org/6841
- http://www.securityfocus.com/advisories/6827
- http://www.securityfocus.com/advisories/7148
- http://www.securityfocus.com/bid/10397
- https://bugzilla.fedora.us/show_bug.cgi?id=1733
- https://exchange.xforce.ibmcloud.com/vulnerabilities/16235
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1033
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11446



