CVE-2019-12970
Ubuntu Security Notice USN-4669-1
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
4Exploited in Wild
-Decision
Descriptions
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
Se detectó un XSS en SquirrelMail hasta la versión 1.4.22 y versión 1.5.x hasta 1.5.2. Debido al manejo inapropiado de los elementos de tipo RCDATA y RAWTEXT, el mecanismo de saneamiento incorporado puede ser omitido. El contenido de script malicioso del correo electrónico HTML puede ejecutarse dentro del contexto de la aplicación por medio de la utilización creada de (por ejemplo) un elemento NOEMBED, NOFRAMES, NOSCRIPT o TEXTAREA.
It was discovered that a cross-site scripting vulnerability in SquirrelMail allows remote attackers to use malicious script content from HTML e-mail to execute code and/or provoke a denial of service.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2019-06-26 CVE Reserved
- 2019-07-01 CVE Published
- 2019-07-01 First Exploit
- 2024-08-04 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
https://lists.debian.org/debian-lts-announce/2019/08/msg00000.html | Mailing List |
|
https://seclists.org/bugtraq/2019/Jul/50 | Mailing List |
|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Squirrelmail Search vendor "Squirrelmail" | Squirrelmail Search vendor "Squirrelmail" for product "Squirrelmail" | <= 1.4.22 Search vendor "Squirrelmail" for product "Squirrelmail" and version " <= 1.4.22" | - |
Affected
| ||||||
Squirrelmail Search vendor "Squirrelmail" | Squirrelmail Search vendor "Squirrelmail" for product "Squirrelmail" | >= 1.5.0 <= 1.5.2 Search vendor "Squirrelmail" for product "Squirrelmail" and version " >= 1.5.0 <= 1.5.2" | - |
Affected
|