Bug 74444 - Squirrelmail-1.2.7 vulnerable to several XSS exploits.
Squirrelmail-1.2.7 vulnerable to several XSS exploits.
Status: CLOSED DUPLICATE of bug 74313
Product: Red Hat Public Beta
Classification: Retired
Component: squirrelmail (Show other bugs)
noarch Linux
medium Severity medium
: ---
: ---
Assigned To: Gary Benson
: Security
Depends On:
  Show dependency treegraph
Reported: 2002-09-24 10:56 EDT by Konstantin Ryabitsev
Modified: 2008-05-01 11:38 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2002-09-24 10:56:51 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Konstantin Ryabitsev 2002-09-24 10:56:45 EDT
Description of Problem:
As you might know, squirrelmail-1.2.7 contains several XSS vulnerabilities. Not
the end of the world, but still worth an update whenever you guys have a chance.

Version-Release number of selected component (if applicable):

Additional Information:
squirrelmail-1.2.8 has been released that fixes this problem, plus has an
additional bonus of no longer requiring register_globals=On in the php config.
Updating the RPMs shouldn't be too hard, as I've pretty much stolen your spec
file. :)
Comment 1 Gary Benson 2002-09-24 11:17:23 EDT
Heh, we stole yours first :)

*** This bug has been marked as a duplicate of 74313 ***

Note You need to log in before you can comment on or make changes to this bug.