CVE-2010-1637

The Mail Fetch plugin in SquirrelMail 1.4.20 and earlier allows remote authenticated users to bypass firewall restrictions and use SquirrelMail as a proxy to scan internal networks via a modified POP3 port number.
References
Link Resource
http://conference.hitb.org/hitbsecconf2010dxb/materials/D1%20-%20Laurent%20Oudot%20-%20Improving%20the%20Stealthiness%20of%20Web%20Hacking.pdf#page=69 Broken Link
http://lists.apple.com/archives/security-announce/2012/Feb/msg00000.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043239.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043258.html Mailing List
http://lists.fedoraproject.org/pipermail/package-announce/2010-June/043261.html Mailing List
http://rhn.redhat.com/errata/RHSA-2012-0103.html Third Party Advisory
http://secunia.com/advisories/40307 Broken Link
http://squirrelmail.org/security/issue/2010-06-21 Patch Vendor Advisory
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/functions.php?r1=13951&r2=13950&pathrev=13951 Product
http://squirrelmail.svn.sourceforge.net/viewvc/squirrelmail/branches/SM-1_4-STABLE/squirrelmail/plugins/mail_fetch/options.php?r1=13951&r2=13950&pathrev=13951 Patch
http://support.apple.com/kb/HT5130 Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:120 Broken Link
http://www.openwall.com/lists/oss-security/2010/05/25/3 Mailing List
http://www.openwall.com/lists/oss-security/2010/05/25/9 Mailing List
http://www.openwall.com/lists/oss-security/2010/06/21/1 Mailing List Patch
http://www.securityfocus.com/bid/40291 Broken Link Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/40307 Broken Link Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2010/1535 Broken Link
http://www.vupen.com/english/advisories/2010/1536 Broken Link
http://www.vupen.com/english/advisories/2010/1554 Broken Link
Configurations

Configuration 1 (hide)

cpe:2.3:a:squirrelmail:squirrelmail:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:fedoraproject:fedora:11:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:12:*:*:*:*:*:*:*
cpe:2.3:o:fedoraproject:fedora:13:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:apple:mac_os_x:*:*:*:*:*:*:*:*
cpe:2.3:o:apple:mac_os_x_server:*:*:*:*:*:*:*:*

Configuration 4 (hide)

OR cpe:2.3:o:redhat:enterprise_linux_desktop:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_server:5.0:*:*:*:*:*:*:*
cpe:2.3:o:redhat:enterprise_linux_workstation:5.0:*:*:*:*:*:*:*

History

No history.

Information

Published : 2010-06-22 17:30

Updated : 2024-02-08 19:56


NVD link : CVE-2010-1637

Mitre link : CVE-2010-1637

CVE.ORG link : CVE-2010-1637


JSON object : View

Products Affected

redhat

  • enterprise_linux_server
  • enterprise_linux_desktop
  • enterprise_linux_workstation

apple

  • mac_os_x
  • mac_os_x_server

fedoraproject

  • fedora

squirrelmail

  • squirrelmail
CWE
CWE-918

Server-Side Request Forgery (SSRF)