Show filters
113 Total Results
Displaying 11-20 of 113
Sort by:
Attacker Value
Unknown
CVE-2013-6365
Disclosure Date: November 05, 2019 (last updated November 27, 2024)
Horde Groupware Web mail 5.1.2 has CSRF with requests to change permissions
0
Attacker Value
Unknown
CVE-2019-12095
Disclosure Date: October 24, 2019 (last updated November 27, 2024)
Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server. NOTE: treanBookmarkTags could, for example, be a stored XSS payload.
0
Attacker Value
Unknown
CVE-2019-12094
Disclosure Date: October 24, 2019 (last updated November 27, 2024)
Horde Groupware Webmail Edition through 5.2.22 allows XSS via an admin/user.php?form=update_f&user_name= or admin/user.php?form=remove_f&user_name= or admin/config/diff.php?app= URI.
0
Attacker Value
Unknown
CVE-2019-9858
Disclosure Date: May 29, 2019 (last updated November 27, 2024)
Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it's never submitted by the forms, which default to securely using a random path.)
0
Attacker Value
Unknown
CVE-2017-17688
Disclosure Date: May 16, 2018 (last updated November 08, 2023)
The OpenPGP specification allows a Cipher Feedback Mode (CFB) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL. NOTE: third parties report that this is a problem in applications that mishandle the Modification Detection Code (MDC) feature or accept an obsolete packet type, not a problem in the OpenPGP specification
0
Attacker Value
Unknown
CVE-2017-17689
Disclosure Date: May 16, 2018 (last updated November 26, 2024)
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
0
Attacker Value
Unknown
CVE-2014-3999
Disclosure Date: April 10, 2018 (last updated November 26, 2024)
The Horde_Ldap library before 2.0.6 for Horde allows remote attackers to bypass authentication by leveraging knowledge of the LDAP bind user DN.
0
Attacker Value
Unknown
CVE-2017-16908
Disclosure Date: November 20, 2017 (last updated November 26, 2024)
In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.
0
Attacker Value
Unknown
CVE-2017-16906
Disclosure Date: November 20, 2017 (last updated November 26, 2024)
In Horde Groupware 5.2.19-5.2.22, there is XSS via the URL field in a "Calendar -> New Event" action.
0
Attacker Value
Unknown
CVE-2017-16907
Disclosure Date: November 20, 2017 (last updated November 26, 2024)
In Horde Groupware 5.2.19 and 5.2.21, there is XSS via the Color field in a Create Task List action.
0