Executive Summary
Summary | |
---|---|
Title | New horde2 packages fix cross-site scripting |
Informations | |||
---|---|---|---|
Name | DSA-1099 | First vendor Publication | 2006-06-14 |
Vendor | Debian | Last vendor Modification | 2006-06-14 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:M/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 6.8 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Medium |
Cvss Expoit Score | 8.6 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Michael Marek discovered that the Horde web application framework performs insufficient input sanitising, which might lead to the injection of web script code through cross-site scripting. The old stable distribution (woody) does not contain horde3 packages. For the stable distribution (sarge) this problem has been fixed in version 2.2.8-1sarge3. The unstable distribution (sid) does no longer contain horde2 packages. We recommend that you upgrade your horde2 package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1099 |
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200606-28 (horde) File : nvt/glsa_200606_28.nasl |
2008-09-04 | Name : FreeBSD Ports: horde, horde-php5 File : nvt/freebsd_horde6.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1098-1 (horde3) File : nvt/deb_1098_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1099-1 (horde2) File : nvt/deb_1099_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
26514 | Horde /templates/problem/problem.inc Multiple Parameter XSS Horde contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'name', 'email', 'subject', and 'message' variables upon submission to the templates/problem/problem.inc script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
26513 | Horde test.php url Parameter XSS Horde contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate the 'url' variable upon submission to the test.php script when the 'mode' variable is set to the value 'phpinfo' or 'filetest'. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-10-17 | Name : The remote openSUSE host is missing a security update. File : suse_horde-1600.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1098.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1099.nasl - Type : ACT_GATHER_INFO |
2006-06-29 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200606-28.nasl - Type : ACT_GATHER_INFO |
2006-06-19 | Name : The remote FreeBSD host is missing one or more security-related updates. File : freebsd_pkg_09429f7cfd6e11dab1cd0050bf27ba24.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2020-05-23 13:03:42 |
|
2016-04-26 17:31:40 |
|
2014-02-17 11:25:55 |
|
2013-05-11 12:16:57 |
|