+++ This bug was initially created as a clone of Bug #162275 +++ A new vulnerability has been discovered in SquirrelMail. The file src/options_identities.php contained some very bad, legacy code: an extract($_POST) was done, effectively allowing a malicious attacker to change session variables and even other people's preferences. It must be noted that for this to happen you need to trick someone into using an external form to post the information which is not trivial.
This issue also affects FC3
Now public at http://www.squirrelmail.org/security/issue/2005-07-13 removing embargo
From User-Agent: XML-RPC squirrelmail-1.4.6-0.cvs20050812.1.fc4 has been pushed for FC4, which should resolve this issue. If these issues are still present in this version, then please re-open this bug.