Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) /* and */ comments, or (2) a newline in a url specifier, which is processed by certain web browsers including Internet Explorer.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Squirrelmail | Squirrelmail | 1.4 (including) | 1.4 (including) |
Squirrelmail | Squirrelmail | 1.4.1 (including) | 1.4.1 (including) |
Squirrelmail | Squirrelmail | 1.4.2 (including) | 1.4.2 (including) |
Squirrelmail | Squirrelmail | 1.4.3 (including) | 1.4.3 (including) |
Squirrelmail | Squirrelmail | 1.4.3_r3 (including) | 1.4.3_r3 (including) |
Squirrelmail | Squirrelmail | 1.4.3_rc1 (including) | 1.4.3_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4.3a (including) | 1.4.3a (including) |
Squirrelmail | Squirrelmail | 1.4.4 (including) | 1.4.4 (including) |
Squirrelmail | Squirrelmail | 1.4.4_rc1 (including) | 1.4.4_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4.5 (including) | 1.4.5 (including) |
Squirrelmail | Squirrelmail | 1.4.6_rc1 (including) | 1.4.6_rc1 (including) |
Squirrelmail | Squirrelmail | 1.4_rc1 (including) | 1.4_rc1 (including) |