SquirrelMail vulnerable to cross-site scripting


SquirrelMail contains a cross-site scripting vulnerability.

SquirrelMail from SquirrelMail Project is an open source webmail (web-based email).
SquirrelMail contains an issue in handling specific character encoding and processing "data:" URL, which may result in cross-site scripting.

Yosuke Hasegawa from Matcha139 reported this vulnerability to IPA.
JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
CVSS Severity (What is CVSS?)

Base Metrics: 4.3 (Medium) [IPA Score]
  • Access Vector: Network
  • Access Complexity: Medium
  • Authentication: None
  • Confidentiality Impact: None
  • Integrity Impact: Partial
  • Availability Impact: None

Affected Products

SquirrelMail Project
  • SquirrelMail 1.4.0 to 1.4.9a
Red Hat, Inc.
  • Red Hat Desktop (v.3)
  • Red Hat Desktop (v.4)
  • Red Hat Enterprise Linux (v.5 server)
  • Red Hat Enterprise Linux AS (v.3)
  • Red Hat Enterprise Linux AS (v.4)
  • Red Hat Enterprise Linux ES (v.3)
  • Red Hat Enterprise Linux ES (v.4)
  • Red Hat Enterprise Linux WS (v.3)
  • Red Hat Enterprise Linux WS (v.4)
  • RHEL Desktop Workstation (v.5 client)


An arbitrary script may be executed on the user's web browser.

[Update the Software]
Update to the latest version of SquirrelMail according to the information provided by the developer.

The issue was resolved in SquirrelMail 1.4.10.
Vendor Information

SquirrelMail Project Red Hat, Inc.
CWE (What is CWE?)

  1. Cross-site Scripting(CWE-79) [IPA Evaluation]
CVE (What is CVE?)

  1. CVE-2007-1262

  1. JVN : JVN#09157962
  2. National Vulnerability Database (NVD) : CVE-2007-1262
  3. Secunia Advisory : SA25200
  4. SecurityFocus : 23910
  5. SecurityTracker : 1018033
  6. FrSIRT Advisories : FrSIRT/ADV-2007-1748
Revision History

  Web page published