Page 3 of 67 results (0.007 seconds)

CVSS: 9.0EPSS: 7%CPEs: 1EXPL: 2

SquirrelMail 1.4.22 (and other versions before 20170427_0200-SVN) allows post-authentication remote code execution via a sendmail.cf file that is mishandled in a popen call. It's possible to exploit this vulnerability to execute arbitrary shell commands on the remote server. The problem is in the Deliver_SendMail.class.php with the initStream function that uses escapeshellcmd() to sanitize the sendmail command before executing it. The use of escapeshellcmd() is not correct in this case since it doesn't escape whitespaces, allowing the injection of arbitrary command parameters. The problem is in -f$envelopefrom within the sendmail command line. • https://www.exploit-db.com/exploits/41910 http://openwall.com/lists/oss-security/2017/04/19/6 http://openwall.com/lists/oss-security/2017/04/27/1 http://www.debian.org/security/2017/dsa-3852 http://www.securityfocus.com/bid/98067 http://www.securitytracker.com/id/1038312 https://legalhackers.com/advisories/SquirrelMail-Exploit-Remote-Code-Exec-CVE-2017-7692-Vuln.html https://security.gentoo.org/glsa/201709-13 • CWE-20: Improper Input Validation •

CVSS: 5.0EPSS: 0%CPEs: 3EXPL: 0

functions/imap_general.php in SquirrelMail, as used in Red Hat Enterprise Linux (RHEL) 4 and 5, does not properly handle 8-bit characters in passwords, which allows remote attackers to cause a denial of service (disk consumption) by making many IMAP login attempts with different usernames, leading to the creation of many preference files. NOTE: this issue exists because of an incorrect fix for CVE-2010-2813. functions/imap_general.php en SquirrelMail, tal y como se usa ??en Red Hat Enterprise Linux (RHEL) v4 y v5 no trata correctamente los caracteres de 8 bits en las contraseñas, lo que permite a atacantes remotos provocar una denegación de servicio (por excesivo consumo de disco) haciendo muchos intentos de acceso IMAP con diferentes nombres de usuario, lo que lleva a la creación de muchos archivos de preferencias. NOTA: este problema existe debido a una reparación incorrecta al CVE-2010-2813. • http://rhn.redhat.com/errata/RHSA-2013-0126.html http://secunia.com/advisories/51730 http://www.openwall.com/lists/oss-security/2012/04/20/22 https://bugzilla.redhat.com/show_bug.cgi?id=814671 https://access.redhat.com/security/cve/CVE-2012-2124 • CWE-399: Resource Management Errors •

CVSS: 4.3EPSS: 0%CPEs: 7EXPL: 0

Cross-site scripting (XSS) vulnerability in the Autocomplete plugin before 3.0 for SquirrelMail allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. Una vulnerabilidad de ejecución de comandos en sitios cruzaods (XSS) en el componente de autocompletado v3.0 de SquirrelMail permite a atacantes remotos inyectar HTML o scripts web a través de vectores no especificados. • http://jvn.jp/en/jp/JVN56653852/index.html http://jvndb.jvn.jp/jvndb/JVNDB-2012-000021 http://squirrelmail.org/plugin_view.php?id=32 • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 5.8EPSS: 1%CPEs: 91EXPL: 0

CRLF injection vulnerability in SquirrelMail 1.4.21 and earlier allows remote attackers to modify or add preference values via a \n (newline) character, a different vulnerability than CVE-2010-4555. Vulnerabilidad de inyección CRLF (se refiere a CR (retorno de carro) y LF (salto de línea)en SquirrelMail v1.4.21 y anteriores, que permite a atacantes remotos modificar o añadir valores de preferencia a través de un retorno de carro o nueva línea de carácter. Es una vulnerabilidad diferente a CVE-2010-4555. • http://rhn.redhat.com/errata/RHSA-2012-0103.html http://www.debian.org/security/2011/dsa-2291 http://www.mandriva.com/security/advisories?name=MDVSA-2011:123 http://www.squirrelmail.org/security/issue/2011-07-11 https://exchange.xforce.ibmcloud.com/vulnerabilities/68587 https://access.redhat.com/security/cve/CVE-2011-2752 https://bugzilla.redhat.com/show_bug.cgi?id=722831 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 0%CPEs: 91EXPL: 0

Multiple cross-site request forgery (CSRF) vulnerabilities in SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the authentication of unspecified victims via vectors involving (1) the empty trash implementation and (2) the Index Order (aka options_order) page, a different issue than CVE-2010-4555. Múltiples vulnerabilidades de falsificación de petición en sitios cruzados (CSRF) en SquirrelMail v1.4.21 y anteriores permite a atacantes remotos secuestrar la autenticación de las víctimas a través de vectores no especificados participación (1) la implementación de la basura y (2) con la página Index Order (también conocido como options_order), una problema diferente a CVE-2010-4555. • http://rhn.redhat.com/errata/RHSA-2012-0103.html http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119 http://www.debian.org/security/2011/dsa-2291 http://www.mandriva.com/security/advisories?name=MDVSA-2011:123 https://bugzilla.redhat.com/show_bug.cgi?id=720694 https://exchange.xforce.ibmcloud.com/vulnerabilities/68586 https://access.redhat.com/security/cve/CVE-2011-2753 https://bugzilla.redhat.com/show_bug.cgi?id=722832 • CWE-352: Cross-Site Request Forgery (CSRF) •