<?xml version="1.0" encoding="utf-8"?>
<feed xml:lang="en-us" xmlns="http://www.w3.org/2005/Atom"><title>Simon Willison's Weblog: squirrelmail</title><link href="http://simonwillison.net/" rel="alternate"/><link href="http://simonwillison.net/tags/squirrelmail.atom" rel="self"/><id>http://simonwillison.net/</id><updated>2007-12-28T23:40:57+00:00</updated><author><name>Simon Willison</name></author><entry><title>The backdooring of SquirrelMail</title><link href="https://simonwillison.net/2007/Dec/28/backdooring/#atom-tag" rel="alternate"/><published>2007-12-28T23:40:57+00:00</published><updated>2007-12-28T23:40:57+00:00</updated><id>https://simonwillison.net/2007/Dec/28/backdooring/#atom-tag</id><summary type="html">
    
&lt;p&gt;&lt;strong&gt;&lt;a href="http://lwn.net/SubscriberLink/262688/2d3182e0471e9f93/"&gt;The backdooring of SquirrelMail&lt;/a&gt;&lt;/strong&gt;&lt;/p&gt;
A SquirrelMail developer’s account was compromised and used to insert a backdoor: the other developers initially missed the hole because it used $_SERVER[’HTTP_BASE_PATH’], which can be set with a Base-Path: HTTP header.


    &lt;p&gt;Tags: &lt;a href="https://simonwillison.net/tags/backdoor"&gt;backdoor&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/http"&gt;http&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/php"&gt;php&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/security"&gt;security&lt;/a&gt;, &lt;a href="https://simonwillison.net/tags/squirrelmail"&gt;squirrelmail&lt;/a&gt;&lt;/p&gt;



</summary><category term="backdoor"/><category term="http"/><category term="php"/><category term="security"/><category term="squirrelmail"/></entry></feed>