Bug 74444 - Squirrelmail-1.2.7 vulnerable to several XSS exploits.
Summary: Squirrelmail-1.2.7 vulnerable to several XSS exploits.
Status: CLOSED DUPLICATE of bug 74313
Alias: None
Product: Red Hat Public Beta
Classification: Retired
Component: squirrelmail (Show other bugs)
(Show other bugs)
Version: null
Hardware: noarch Linux
medium
medium
Target Milestone: ---
Assignee: Gary Benson
QA Contact:
URL: http://www.squirrelmail.org/
Whiteboard:
Keywords: Security
Depends On:
Blocks:
TreeView+ depends on / blocked
 
Reported: 2002-09-24 14:56 UTC by Konstantin Ryabitsev
Modified: 2008-05-01 15:38 UTC (History)
0 users

Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2002-09-24 14:56:51 UTC
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

Description Konstantin Ryabitsev 2002-09-24 14:56:45 UTC
Description of Problem:
As you might know, squirrelmail-1.2.7 contains several XSS vulnerabilities. Not
the end of the world, but still worth an update whenever you guys have a chance.

Version-Release number of selected component (if applicable):
squirrelmail-1.2.7

Additional Information:
squirrelmail-1.2.8 has been released that fixes this problem, plus has an
additional bonus of no longer requiring register_globals=On in the php config.
Updating the RPMs shouldn't be too hard, as I've pretty much stolen your spec
file. :)

Comment 1 Gary Benson 2002-09-24 15:17:23 UTC
Heh, we stole yours first :)

*** This bug has been marked as a duplicate of 74313 ***


Note You need to log in before you can comment on or make changes to this bug.