CVE-2008-1974

Cross-site scripting (XSS) vulnerability in addevent.php in Horde Kronolith 2.1.7, Groupware Webmail Edition 1.0.6, and Groupware 1.0.5 allows remote attackers to inject arbitrary web script or HTML via the url parameter.
References
Link Resource
http://forum.aria-security.com/showthread.php?t=49 Exploit
http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html
http://osvdb.org/51238
http://secunia.com/advisories/29920 Vendor Advisory
http://secunia.com/advisories/30649
http://securityreason.com/securityalert/3831
http://www.securityfocus.com/archive/1/491230/100/0/threaded
http://www.securityfocus.com/bid/28898 Exploit
http://www.securitytracker.com/id?1019934
http://www.vupen.com/english/advisories/2008/1373/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41974
https://www.debian.org/security/2008/dsa-1560
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html
http://forum.aria-security.com/showthread.php?t=49 Exploit
http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html
http://osvdb.org/51238
http://secunia.com/advisories/29920 Vendor Advisory
http://secunia.com/advisories/30649
http://securityreason.com/securityalert/3831
http://www.securityfocus.com/archive/1/491230/100/0/threaded
http://www.securityfocus.com/bid/28898 Exploit
http://www.securitytracker.com/id?1019934
http://www.vupen.com/english/advisories/2008/1373/references
https://exchange.xforce.ibmcloud.com/vulnerabilities/41974
https://www.debian.org/security/2008/dsa-1560
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html
https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*

History

21 Nov 2024, 00:45

Type Values Removed Values Added
References () http://forum.aria-security.com/showthread.php?t=49 - Exploit () http://forum.aria-security.com/showthread.php?t=49 - Exploit
References () http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html - () http://lists.horde.org/archives/kronolith/Week-of-Mon-20080421/006807.html -
References () http://osvdb.org/51238 - () http://osvdb.org/51238 -
References () http://secunia.com/advisories/29920 - Vendor Advisory () http://secunia.com/advisories/29920 - Vendor Advisory
References () http://secunia.com/advisories/30649 - () http://secunia.com/advisories/30649 -
References () http://securityreason.com/securityalert/3831 - () http://securityreason.com/securityalert/3831 -
References () http://www.securityfocus.com/archive/1/491230/100/0/threaded - () http://www.securityfocus.com/archive/1/491230/100/0/threaded -
References () http://www.securityfocus.com/bid/28898 - Exploit () http://www.securityfocus.com/bid/28898 - Exploit
References () http://www.securitytracker.com/id?1019934 - () http://www.securitytracker.com/id?1019934 -
References () http://www.vupen.com/english/advisories/2008/1373/references - () http://www.vupen.com/english/advisories/2008/1373/references -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41974 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41974 -
References () https://www.debian.org/security/2008/dsa-1560 - () https://www.debian.org/security/2008/dsa-1560 -
References () https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html - () https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00427.html -
References () https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html - () https://www.redhat.com/archives/fedora-package-announce/2008-June/msg00444.html -

Information

Published : 2008-04-27 19:05

Updated : 2024-11-21 00:45


NVD link : CVE-2008-1974

Mitre link : CVE-2008-1974

CVE.ORG link : CVE-2008-1974


JSON object : View

Products Affected

horde

  • groupware_webmail_edition
  • groupware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')