CVE-2005-4190

Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework before 3.0.8 allow remote authenticated users to inject arbitrary web script or HTML via multiple vectors, as demonstrated by (1) the identity field, (2) Category and (3) Label search fields, (4) the Mobile Phone field, and (5) Date and (6) Time fields when importing CSV files, as exploited through modules such as (a) Turba Address Book, (b) Kronolith, (c) Mnemo, and (d) Nag.
References
Link Resource
http://lists.horde.org/archives/announce/2005/000238.html Patch
http://secunia.com/advisories/17970 Patch Vendor Advisory
http://secunia.com/advisories/19619 Vendor Advisory
http://secunia.com/advisories/19897 Vendor Advisory
http://secunia.com/advisories/20960 Vendor Advisory
http://www.debian.org/security/2006/dsa-1033
http://www.novell.com/linux/security/advisories/2006_04_28.html
http://www.novell.com/linux/security/advisories/2006_16_sr.html
http://www.sec-consult.com/245.html
http://www.securityfocus.com/bid/15802
http://www.securityfocus.com/bid/15803
http://www.securityfocus.com/bid/15804
http://www.securityfocus.com/bid/15806
http://www.securityfocus.com/bid/15808
http://www.securityfocus.com/bid/15810
http://www.vupen.com/english/advisories/2005/2835 Vendor Advisory
http://lists.horde.org/archives/announce/2005/000238.html Patch
http://secunia.com/advisories/17970 Patch Vendor Advisory
http://secunia.com/advisories/19619 Vendor Advisory
http://secunia.com/advisories/19897 Vendor Advisory
http://secunia.com/advisories/20960 Vendor Advisory
http://www.debian.org/security/2006/dsa-1033
http://www.novell.com/linux/security/advisories/2006_04_28.html
http://www.novell.com/linux/security/advisories/2006_16_sr.html
http://www.sec-consult.com/245.html
http://www.securityfocus.com/bid/15802
http://www.securityfocus.com/bid/15803
http://www.securityfocus.com/bid/15804
http://www.securityfocus.com/bid/15806
http://www.securityfocus.com/bid/15808
http://www.securityfocus.com/bid/15810
http://www.vupen.com/english/advisories/2005/2835 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:horde_application_framework:1.0.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.2_1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.3_2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.3_3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.3_4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.10:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.0.11:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.3.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:1.3.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:2.2.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:horde_application_framework:3.0.7:*:*:*:*:*:*:*

History

21 Nov 2024, 00:03

Type Values Removed Values Added
References () http://lists.horde.org/archives/announce/2005/000238.html - Patch () http://lists.horde.org/archives/announce/2005/000238.html - Patch
References () http://secunia.com/advisories/17970 - Patch, Vendor Advisory () http://secunia.com/advisories/17970 - Patch, Vendor Advisory
References () http://secunia.com/advisories/19619 - Vendor Advisory () http://secunia.com/advisories/19619 - Vendor Advisory
References () http://secunia.com/advisories/19897 - Vendor Advisory () http://secunia.com/advisories/19897 - Vendor Advisory
References () http://secunia.com/advisories/20960 - Vendor Advisory () http://secunia.com/advisories/20960 - Vendor Advisory
References () http://www.debian.org/security/2006/dsa-1033 - () http://www.debian.org/security/2006/dsa-1033 -
References () http://www.novell.com/linux/security/advisories/2006_04_28.html - () http://www.novell.com/linux/security/advisories/2006_04_28.html -
References () http://www.novell.com/linux/security/advisories/2006_16_sr.html - () http://www.novell.com/linux/security/advisories/2006_16_sr.html -
References () http://www.sec-consult.com/245.html - () http://www.sec-consult.com/245.html -
References () http://www.securityfocus.com/bid/15802 - () http://www.securityfocus.com/bid/15802 -
References () http://www.securityfocus.com/bid/15803 - () http://www.securityfocus.com/bid/15803 -
References () http://www.securityfocus.com/bid/15804 - () http://www.securityfocus.com/bid/15804 -
References () http://www.securityfocus.com/bid/15806 - () http://www.securityfocus.com/bid/15806 -
References () http://www.securityfocus.com/bid/15808 - () http://www.securityfocus.com/bid/15808 -
References () http://www.securityfocus.com/bid/15810 - () http://www.securityfocus.com/bid/15810 -
References () http://www.vupen.com/english/advisories/2005/2835 - Vendor Advisory () http://www.vupen.com/english/advisories/2005/2835 - Vendor Advisory

Information

Published : 2005-12-13 11:03

Updated : 2024-11-21 00:03


NVD link : CVE-2005-4190

Mitre link : CVE-2005-4190

CVE.ORG link : CVE-2005-4190


JSON object : View

Products Affected

horde

  • horde_application_framework
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')