[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248038

 
 

909

 
 

194772

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

DSA-1966-1 horde3 -- insufficient input sanitising

ID: oval:org.secpod.oval:def:600075Date: (C)2011-01-28   (M)2022-10-10
Class: PATCHFamily: unix




Several vulnerabilities have been found in horde3, the horde web application framework. The Common Vulnerabilities and Exposures project identifies the following problems: CVE-2009-3237 It has been discovered that horde3 is prone to cross-site scripting attacks via crafted number preferences or inline MIME text parts when using text/plain as MIME type. For lenny this issue was already fixed, but as an additional security precaution, the display of inline text was disabled in the configuration file. CVE-2009-3701 It has been discovered that the horde3 administration interface is prone to cross-site scripting attacks due to the use of the PHP_SELF variable. This issue can only be exploited by authenticated administrators. CVE-2009-4363 It has been discovered that horde3 is prone to several cross-site scripting attacks via crafted data:text/html values in HTML messages. For the stable distribution , these problems have been fixed in version 3.2.2+debian0-2+lenny2. For the oldstable distribution , these problems have been fixed in version 3.1.3-4etch7. For the testing distribution and the unstable distribution , these problems have been fixed in version 3.3.6+debian0-1. We recommend that you upgrade your horde3 packages.

Platform:
Debian 5.0
Debian 4.0
Product:
horde3
Reference:
DSA-1966-1
CVE-2009-3237
CVE-2009-3701
CVE-2009-4363
CVE    3
CVE-2009-3237
CVE-2009-3701
CVE-2009-4363
CPE    2
cpe:/o:debian:debian_linux:4.0
cpe:/o:debian:debian_linux:5.0

© SecPod Technologies