Description
XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-1868-1 | squirrelmail security update |
EUVD |
EUVD-2019-4545 | XSS was discovered in SquirrelMail through 1.4.22 and 1.5.x through 1.5.2. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element. |
Ubuntu USN |
USN-4669-1 | SquirrelMail vulnerability |
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T23:41:09.227Z
Reserved: 2019-06-26T00:00:00.000Z
Link: CVE-2019-12970
No data.
Status : Modified
Published: 2019-07-01T11:15:09.233
Modified: 2024-11-21T04:23:55.340
Link: CVE-2019-12970
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
EUVD
Ubuntu USN