MGASA-2021-0010 - Updated squirrelmail packages fix security vulnerabilities

Publication date: 08 Jan 2021
URL: https://advisories.mageia.org/MGASA-2021-0010.html
Type: security
Affected Mageia releases: 7
CVE: CVE-2019-12970

XSS was discovered in SquirrelMail through 1.4.22. Due to improper handling of
RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be
bypassed. Malicious script content from HTML e-mail can be executed within the
application context via crafted use of (for example) a NOEMBED, NOFRAMES,
NOSCRIPT, or TEXTAREA element ().

An unsafe use of unserialize() in compose.php has also been fixed.

References:
- https://bugs.mageia.org/show_bug.cgi?id=27821
- https://www.openwall.com/lists/oss-security/2020/06/20/1
- https://ubuntu.com/security/notices/USN-4669-1
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12970

SRPMS:
- 7/core/squirrelmail-1.4.23-0.svn20201220_0200.1.mga7

Mageia 2021-0010: squirrelmail security update

XSS was discovered in SquirrelMail through 1.4.22

Summary

XSS was discovered in SquirrelMail through 1.4.22. Due to improper handling of RCDATA and RAWTEXT type elements, the built-in sanitization mechanism can be bypassed. Malicious script content from HTML e-mail can be executed within the application context via crafted use of (for example) a NOEMBED, NOFRAMES, NOSCRIPT, or TEXTAREA element ().
An unsafe use of unserialize() in compose.php has also been fixed.

References

- https://bugs.mageia.org/show_bug.cgi?id=27821

- https://www.openwall.com/lists/oss-security/2020/06/20/1

- https://ubuntu.com/security/notices/USN-4669-1

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-12970

Resolution

MGASA-2021-0010 - Updated squirrelmail packages fix security vulnerabilities

SRPMS

- 7/core/squirrelmail-1.4.23-0.svn20201220_0200.1.mga7

Severity
Publication date: 08 Jan 2021
URL: https://advisories.mageia.org/MGASA-2021-0010.html
Type: security
CVE: CVE-2019-12970

Related News