Interpretation conflict in the MagicHTML filter in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to conduct cross-site scripting (XSS) attacks via style sheet specifiers with invalid (1) "/*" and "*/" comments, or (2) a newline in a "url" specifier, which is processed by certain web browsers including Internet Explorer.
2006-02-24T00:02:00.000
2025-04-03T01:03:51.193
Deferred
CVSSv2: 4.3 (MEDIUM)
AV:N/AC:M/Au:N/C:N/I:P/A:N
8.6
2.9
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | squirrelmail | squirrelmail | 1.4 | Yes |
Application | squirrelmail | squirrelmail | 1.4.1 | Yes |
Application | squirrelmail | squirrelmail | 1.4.2 | Yes |
Application | squirrelmail | squirrelmail | 1.4.3 | Yes |
Application | squirrelmail | squirrelmail | 1.4.3_r3 | Yes |
Application | squirrelmail | squirrelmail | 1.4.3_rc1 | Yes |
Application | squirrelmail | squirrelmail | 1.4.3a | Yes |
Application | squirrelmail | squirrelmail | 1.4.4 | Yes |
Application | squirrelmail | squirrelmail | 1.4.4_rc1 | Yes |
Application | squirrelmail | squirrelmail | 1.4.5 | Yes |
Application | squirrelmail | squirrelmail | 1.4.6_rc1 | Yes |
Application | squirrelmail | squirrelmail | 1.4_rc1 | Yes |