Package: sqwebmail
Version: 0.47-4
Severity: important
Tags: security

sqwebmail is vulnerable to a cross-site scripting attack:

  Input passed to the "redirect" parameter is not properly sanitised. This can
  be exploited to inject malicious characters into HTTP headers and may allow
  execution of arbitrary HTML and script code in a user's browser session in
  context of an affected site.

Details here: http://secunia.com/advisories/15119

This is supposed to be a working proof of concept, but I've not actually
tested it:

sqwebmail?redirect=%0d%0a%0d%0a[INJECT SCRIPT] 

-- 
see shy jo

Attachment: signature.asc
Description: Digital signature

Reply via email to