|Description||webmail.php in SquirrelMail 1.4.0 to 1.4.5 allows remote attackers to inject arbitrary web pages into the right frame via a URL in the right_frame parameter. NOTE: this has been called a cross-site scripting (XSS) issue, but it is different than what is normally identified as XSS.|
|Source||CVE (at NVD; oss-sec, fulldisc, OSVDB, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, web search, more)|
|NVD severity||medium (attack range: remote)|
|Debian/testing||not known to be vulnerable.|
Vulnerable and fixed packages
The table below lists information on source packages.
|squirrelmail (PTS)||squeeze, squeeze (security)||2:1.4.21-2||fixed|
|sid, jessie, wheezy||2:1.4.23~svn20120406-2||fixed|
The information below is based on the following data on fixed versions.