CVE-2009-3701

Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.
References
Link Resource
http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html Exploit
http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h
http://lists.horde.org/archives/announce/2009/000529.html Patch
http://marc.info/?l=horde-announce&m=126100750018478&w=2
http://marc.info/?l=horde-announce&m=126101076422179&w=2 Patch
http://secunia.com/advisories/37709 Vendor Advisory
http://secunia.com/advisories/37823 Vendor Advisory
http://securitytracker.com/id?1023365
http://www.securityfocus.com/archive/1/508531/100/0/threaded
http://www.securityfocus.com/bid/37351 Exploit
http://www.vupen.com/english/advisories/2009/3549 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3572 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54817
http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html Exploit
http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h
http://lists.horde.org/archives/announce/2009/000529.html Patch
http://marc.info/?l=horde-announce&m=126100750018478&w=2
http://marc.info/?l=horde-announce&m=126101076422179&w=2 Patch
http://secunia.com/advisories/37709 Vendor Advisory
http://secunia.com/advisories/37823 Vendor Advisory
http://securitytracker.com/id?1023365
http://www.securityfocus.com/archive/1/508531/100/0/threaded
http://www.securityfocus.com/bid/37351 Exploit
http://www.vupen.com/english/advisories/2009/3549 Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/3572 Patch Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/54817
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*

History

21 Nov 2024, 01:07

Type Values Removed Values Added
References () http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html - Exploit () http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html - Exploit
References () http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h - () http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559&r2=1.515.2.589&ty=h -
References () http://lists.horde.org/archives/announce/2009/000529.html - Patch () http://lists.horde.org/archives/announce/2009/000529.html - Patch
References () http://marc.info/?l=horde-announce&m=126100750018478&w=2 - () http://marc.info/?l=horde-announce&m=126100750018478&w=2 -
References () http://marc.info/?l=horde-announce&m=126101076422179&w=2 - Patch () http://marc.info/?l=horde-announce&m=126101076422179&w=2 - Patch
References () http://secunia.com/advisories/37709 - Vendor Advisory () http://secunia.com/advisories/37709 - Vendor Advisory
References () http://secunia.com/advisories/37823 - Vendor Advisory () http://secunia.com/advisories/37823 - Vendor Advisory
References () http://securitytracker.com/id?1023365 - () http://securitytracker.com/id?1023365 -
References () http://www.securityfocus.com/archive/1/508531/100/0/threaded - () http://www.securityfocus.com/archive/1/508531/100/0/threaded -
References () http://www.securityfocus.com/bid/37351 - Exploit () http://www.securityfocus.com/bid/37351 - Exploit
References () http://www.vupen.com/english/advisories/2009/3549 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/3549 - Patch, Vendor Advisory
References () http://www.vupen.com/english/advisories/2009/3572 - Patch, Vendor Advisory () http://www.vupen.com/english/advisories/2009/3572 - Patch, Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/54817 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/54817 -

Information

Published : 2009-12-21 16:30

Updated : 2024-11-21 01:07


NVD link : CVE-2009-3701

Mitre link : CVE-2009-3701

CVE.ORG link : CVE-2009-3701


JSON object : View

Products Affected

horde

  • application_framework
  • groupware
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')