Vulnerability Description
SquirrelMail 1.4.6 and earlier, with register_globals enabled, allows remote attackers to hijack cookies in src/redirect.php via unknown vectors. NOTE: while "cookie theft" is frequently associated with XSS, the vendor disclosure is too vague to be certain of this.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squirrelmail | Squirrelmail | 1.4.6 |
References
- http://www.securityfocus.com/bid/17005
- http://www.squirrelmail.org/changelog.php
- http://www.vupen.com/english/advisories/2006/2708
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27632
- http://www.securityfocus.com/bid/17005
- http://www.squirrelmail.org/changelog.php
- http://www.vupen.com/english/advisories/2006/2708
- https://exchange.xforce.ibmcloud.com/vulnerabilities/27632
FAQ
What is CVE-2006-3665?
CVE-2006-3665 is a vulnerability with a CVSS score of 4.3 (MEDIUM). SquirrelMail 1.4.6 and earlier, with register_globals enabled, allows remote attackers to hijack cookies in src/redirect.php via unknown vectors. NOTE: while "cookie theft" is frequently associated w...
How severe is CVE-2006-3665?
CVE-2006-3665 has been rated MEDIUM with a CVSS base score of 4.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2006-3665?
Check the references section above for vendor advisories and patch information. Affected products include: Squirrelmail Squirrelmail.