SqWebMail 3.x/4.0 - HTTP Response Splitting

Author: Zinho
type: webapps
platform: php
port: 
date_added: 2005-04-15  
date_updated: 2013-05-18  
verified: 1  
codes: CVE-2005-1308;OSVDB-15819  
tags:   
aliases:   
screenshot_url:   
application_url:   

raw file: 25534.txt  
source: https://www.securityfocus.com/bid/13374/info

SQWebmail is prone to a HTTP response splitting vulnerability. This issue is due to a failure in the application to properly sanitize user-supplied input.

A remote attacker may exploit this vulnerability to influence or misrepresent how Web content is served, cached or interpreted. This could aid in various attacks that attempt to entice client users into a false sense of trust.

sqwebmail?redirect=%0d%0a%0d%0a[INJECT SCRIPT]