Gentoo Websites Logo
Go to: Gentoo Home Documentation Forums Lists Bugs Planet Store Wiki Get Gentoo!

Bug 70739

Summary: mail-client/squirrelmail Cross Site Scripting in encoded text
Product: Gentoo Security Reporter: Rajiv Aaron Manglani (RETIRED) <rajiv>
Component: VulnerabilitiesAssignee: Gentoo Security <security>
Status: RESOLVED FIXED    
Severity: minor CC: eradicator, stuart
Priority: Normal    
Version: unspecified   
Hardware: All   
OS: All   
URL: http://article.gmane.org/gmane.mail.squirrelmail.user/21169
Whiteboard: B4 [glsa] jaervosz
Package list:
Runtime testing required: ---

Description Rajiv Aaron Manglani (RETIRED) gentoo-dev 2004-11-10 21:18:26 UTC
From: 	  jon@squirrelmail.org
	Subject: 	[SquirrelMail Security Advisory] Cross Site Scripting in encoded text
	Date: 	November 10, 2004 1:04:51 AM EST
	To: 	  squirrelmail-devel@lists.sourceforge.net, squirrelmail-announce@lists.sourceforge.net
	Cc: 	  squirrelmail-users@lists.sourceforge.net, squirrelmail-plugins@lists.sourceforge.net, bugtraq@securityfocus.com

SquirrelMail Security Notice
============================

About
-----
SquirrelMail is a standards-based webmail package written in PHP4. It
includes built-in pure PHP support for the IMAP and SMTP protocols,
and all pages render in pure HTML 4.0 (with no JavaScript required)
for maximum compatibility across browsers. It has very few
requirements and is very easy to configure and install. SquirrelMail
has all the functionality you would want from an email client,
including strong MIME support, address books, and folder manipulation.

Details
-------
There is a cross site scripting issue in the decoding of encoded text
in certain headers. SquirrelMail correctly decodes the specially
crafted header, but doesn't sanitize the decoded strings.

Affected
--------
SquirrelMail 1.4.3a and earlier
SquirrelMail 1.5.1-cvs before 23rd October 2004

Resolution
----------
A patch has been published to resolve this issue for the SquirrelMail
1.4.3a branch, and can be downloaded from here:


http://prdownloads.sourceforge.net/squirrelmail/sm143a-xss.diff?download

To apply this patch, copy the sm143a-xss.diff file into the base
SquirrelMail directory, and follow the command:

  patch -p0 < sm143a-xss.diff

Those using SquirrelMail 1.5.1-cvs should update using CVS, or use a
copy of the latest snapshot downloadable from the SquirrelMail
website
at:

  http://www.squirrelmail.org


Acknowledgements
----------------
Special thanks goes to Joost Pol for notifying us about this issue.


Comments
--------
The SquirrelMail development team work hard with people reporting
security issues in an attempt to resolve issues. We appreciate those
that are willing to dedicate the time to work with us on any issue
they uncover in the SquirrelMail project.

If any further issues are uncovered, a dedicated mail address can be
used to report the issue.  The address is security@squirrelmail.org.

-- 
Jonathan Angliss
(jon@squirrelmail.org)
Comment 1 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-11-10 22:34:20 UTC
Jeremy please provide a fixed ebuild.
Comment 2 Jeremy Huddleston (RETIRED) gentoo-dev 2004-11-11 00:23:50 UTC
the second chunk of that patch looks bad... I'm gonna verify upstream...
Comment 3 Jeremy Huddleston (RETIRED) gentoo-dev 2004-11-11 00:35:25 UTC
Stuart, how do you force all vhosts using an old version of a webapp to update to the new one?  Can this information be included in the glsa for glsa-check automation?

ppc: please test out 1.4.3a-r2 and mark stable
Comment 4 Jeremy Huddleston (RETIRED) gentoo-dev 2004-11-11 00:36:04 UTC
oh, and for the record I checked the second hunk and I was confused... it's fine...
Comment 5 Jochen Maes (RETIRED) gentoo-dev 2004-11-11 07:14:40 UTC
stable on ppc
Comment 6 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-11-14 10:06:14 UTC
GLSA drafted Security please review.
Comment 7 Sune Kloppenborg Jeppesen (RETIRED) gentoo-dev 2004-11-17 01:45:03 UTC
GLSA 200411-25