Description of Problem:
SquirrelMail 1.2.7 is vulnerable to a number of cross-site scripting attacks
that were fixed in 1.2.8.
An errata upgrade to 1.2.8 (rather than a backport of the XSS fixes from 1.2.8
to 1.2.7) would be nice, since 1.2.8 also removes the need for register_globals....
Created attachment 76724 [details]
Script to check vulnerability
Note that SquirrelMail 1.2.7 (at least as we ship it) was never vulnerable to
the fourth test.
*** Bug 74444 has been marked as a duplicate of this bug. ***
These bugs have been designated CAN-2002-1131 and CAN-2002-1132.
An errata has been issued which should help the problem described in this bug report.
This report is therefore being closed with a resolution of ERRATA. For more information
on the solution and/or where to find the updated files, please follow the link below. You may reopen
this bug report if the solution does not work for you.