Mageia 2021-0010: squirrelmail security update
Summary
XSS was discovered in SquirrelMail through 1.4.22. Due to improper handling of
RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be
bypassed. Malicious script content from HTML e-mail can be executed within the
application context via crafted use of (for example) a NOEMBED, NOFRAMES,
NOSCRIPT, or TEXTAREA element ().
An unsafe use of unserialize() in compose.php has also been fixed.
References
- https://bugs.mageia.org/show_bug.cgi?id=27821
- https://www.openwall.com/lists/oss-security/2020/06/20/1
- https://ubuntu.com/security/notices/USN-4669-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12970
Resolution
MGASA-2021-0010 - Updated squirrelmail packages fix security vulnerabilities
SRPMS
- 7/core/squirrelmail-1.4.23-0.svn20201220_0200.1.mga7