On Tue, 3 May 2005 20:26:39 -0400
Joey Hess <[EMAIL PROTECTED]> wrote:

> Package: sqwebmail
> Version: 0.47-4
> Severity: important
> Tags: security
> 
> sqwebmail is vulnerable to a cross-site scripting attack:
> 
>   Input passed to the "redirect" parameter is not properly sanitised. This can
>   be exploited to inject malicious characters into HTTP headers and may allow
>   execution of arbitrary HTML and script code in a user's browser session in
>   context of an affected site.
> 
> Details here: http://secunia.com/advisories/15119

The upstream author commented that advisory as follows:

I certainly never heard of it, and the description (or the lack of it) 
leaves me somewhat skeptical.  The redirect URL is generated by: 
output_attrencoded(cgi("redirect")), which encodes all metacharacters.

Move along, nothing here to see.

Bye
        Racke

-- 
LinuXia Systems => http://www.linuxia.de/
Expert Interchange Consulting and System Administration
ICDEVGROUP => http://www.icdevgroup.org/
Interchange Development Team



-- 
To UNSUBSCRIBE, email to [EMAIL PROTECTED]
with a subject of "unsubscribe". Trouble? Contact [EMAIL PROTECTED]

Reply via email to