Red Hat Bugzilla – Bug 722832
CVE-2011-2753 SquirrelMail: CSRF in the empty trash feature and in Index Order page
Last modified: 2016-03-04 06:22:10 EST
Common Vulnerabilities and Exposures assigned an identifier CVE-2011-2753 to
the following vulnerability:
Multiple cross-site request forgery (CSRF) vulnerabilities in
SquirrelMail 1.4.21 and earlier allow remote attackers to hijack the
authentication of unspecified victims via vectors involving (1) the
empty trash implementation and (2) the Index Order (aka options_order)
page, a different issue than CVE-2010-4555.
Upstream patch (subpart of , relevant to options order and empty trash implementation):
(empty trash implementation)
These issues affect the versions of the squirrelmail package, as shipped with
Red Hat Enterprise Linux 4 and 5.
These issues do not affect the version of the squirrelmail package, as present
within EPEL-6 repository. Relevant package update has been already performed.
These issues do not affect the versions of the squirrelmail package, as shipped
with Fedora release of 14 and 15. Squirrelmail package updates has been already
scheduled (squirrelmail-1.4.22-2.fc14, squirrelmail-1.4.22-2.fc15) and once
they have passed the required testing, they will be pushed to particular Fedora
This issue has been addressed in following products:
Red Hat Enterprise Linux 4
Red Hat Enterprise Linux 5
Via RHSA-2012:0103 https://rhn.redhat.com/errata/RHSA-2012-0103.html