Multiple cross-site scripting (XSS) flaws were found in the SquirrelMail webmail client: * XSS flaws in generic options inputs, * XSS flaw in the SquirrelSpell plug-in, * XSS flaw in the Index Order page. Also protection against Cross-site Request Forgery (CSRF) flaws has been added to the empty trash feature and to the Index Order page. The CSRF flaws got a dedicated CVE identifier of CVE-2011-2753. For further information have a look at: [1] https://bugzilla.redhat.com/show_bug.cgi?id=CVE-2011-2753 Upstream advisory: [2] http://www.squirrelmail.org/security/issue/2011-07-11 Relevant upstream patch: [3] http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail?view=revision&revision=14119
These issues affect the versions of the squirrelmail package, as shipped with Red Hat Enterprise Linux 4 and 5. -- These issues affect the version of the squirrelmail package, as present within EPEL-6 repository. Please schedule an update. -- These issues affect the versions of the squirrelmail package, as shipped with Fedora release of 14 and 15. Please schedule an update.
Created squirrelmail tracking bugs for this issue Affects: epel-6 [bug 720696] Affects: fedora-all [bug 720697]
This issue has been addressed in following products: Red Hat Enterprise Linux 4 Red Hat Enterprise Linux 5 Via RHSA-2012:0103 https://rhn.redhat.com/errata/RHSA-2012-0103.html