CVE-2008-2379
Severity CVSS v4.0:
Pending analysis
Type:
CWE-79
Cross-Site Scripting (XSS)
Publication date:
05/12/2008
Last modified:
09/04/2025
Description
Cross-site scripting (XSS) vulnerability in SquirrelMail before 1.4.17 allows remote attackers to inject arbitrary web script or HTML via a crafted hyperlink in an HTML part of an e-mail message.
Impact
Base Score 2.0
4.30
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:* | 1.4.16 (including) | |
| cpe:2.3:a:squirrelmail:squirrelmail:0.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.1.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.1.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.2.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.3.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.3pre1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.3pre2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.4:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.4pre1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.4pre2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.5:*:*:*:*:*:*:* | ||
| cpe:2.3:a:squirrelmail:squirrelmail:0.5pre1:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://secunia.com/advisories/32143
- http://secunia.com/advisories/33054
- http://secunia.com/advisories/33071
- http://secunia.com/advisories/33937
- http://security-net.biz/wsw/index.php?p=254&n=190
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2008/dsa-1682
- http://www.securityfocus.com/bid/32603
- http://www.squirrelmail.org/index.php
- http://www.vupen.com/english/advisories/2008/3332
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47024
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html
- http://lists.apple.com/archives/security-announce/2009/Feb/msg00000.html
- http://lists.opensuse.org/opensuse-security-announce/2008-12/msg00002.html
- http://secunia.com/advisories/32143
- http://secunia.com/advisories/33054
- http://secunia.com/advisories/33071
- http://secunia.com/advisories/33937
- http://security-net.biz/wsw/index.php?p=254&n=190
- http://support.apple.com/kb/HT3438
- http://www.debian.org/security/2008/dsa-1682
- http://www.securityfocus.com/bid/32603
- http://www.squirrelmail.org/index.php
- http://www.vupen.com/english/advisories/2008/3332
- https://exchange.xforce.ibmcloud.com/vulnerabilities/47024
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9764
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00223.html
- https://www.redhat.com/archives/fedora-package-announce/2008-December/msg00449.html



