Description of Problem: SquirrelMail 1.2.7 is vulnerable to a number of cross-site scripting attacks that were fixed in 1.2.8. http://marc.theaimsgroup.com/?l=bugtraq&m=103247206804691&w=2 http://marc.theaimsgroup.com/?l=bugtraq&m=103247843910484&w=2
An errata upgrade to 1.2.8 (rather than a backport of the XSS fixes from 1.2.8 to 1.2.7) would be nice, since 1.2.8 also removes the need for register_globals....
Created attachment 76724 [details] Script to check vulnerability
Note that SquirrelMail 1.2.7 (at least as we ship it) was never vulnerable to the fourth test.
*** Bug 74444 has been marked as a duplicate of this bug. ***
These bugs have been designated CAN-2002-1131 and CAN-2002-1132.
An errata has been issued which should help the problem described in this bug report. This report is therefore being closed with a resolution of ERRATA. For more information on the solution and/or where to find the updated files, please follow the link below. You may reopen this bug report if the solution does not work for you. http://rhn.redhat.com/errata/RHSA-2002-204.html