Vulnerability Name: | CVE-2004-0591 (CCN-16467) | ||||||||
Assigned: | 2004-06-21 | ||||||||
Published: | 2004-06-21 | ||||||||
Updated: | 2017-07-11 | ||||||||
Summary: | Cross-site scripting (XSS) vulnerability in the print_header_uc function for SqWebMail 4.0.4 and earlier, and possibly 3.x, allows remote attackers to inject arbitrary web script or HRML via (1) e-mail headers or (2) a message with a "message/delivery-status" MIME Content-Type. This vulnerability is addressed in the following product release: Inter7, SqWebMail, 4.0.5 | ||||||||
CVSS v3 Severity: | 5.6 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Mon Jun 21 2004 - 04:07:09 CDT XSS vulnerability in Sqwebmail 4.0.4 Source: MITRE Type: CNA CVE-2004-0591 Source: BUGTRAQ Type: UNKNOWN 20040621 XSS vulnerability in Sqwebmail 4.0.4 Source: CCN Type: SA11918 SqWebMail "print_header_uc()" Function Script Insertion Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory 11918 Source: DEBIAN Type: Patch, Vendor Advisory DSA-533 Source: DEBIAN Type: DSA-533 courier -- cross-site scripting Source: CCN Type: GLSA-200408-02 Courier: Cross-site scripting vulnerability in SqWebMail Source: GENTOO Type: Patch, Vendor Advisory GLSA-200408-02 Source: CCN Type: SqWebMail Web page Inter7 Source: CCN Type: OSVDB ID: 7214 SqWebMail print_header_uc Header XSS Source: BID Type: Exploit, Patch 10588 Source: CCN Type: BID-10588 SqWebMail Email Header HTML Injection Vulnerability Source: XF Type: UNKNOWN sqwebmail-print-header-xss(16467) Source: XF Type: UNKNOWN sqwebmail-print-header-xss(16467) | ||||||||
Vulnerable Configuration: | Configuration 1: Denotes that component is vulnerable | ||||||||
Oval Definitions | |||||||||
| |||||||||
BACK |