lib/Horde/Mime/Viewer/Ooo.php in Horde Mime_Viewer before 2.2.4 allows XSS via an OpenOffice document, leading to account takeover in Horde Groupware Webmail Edition. This occurs after XSLT rendering.
References
Link | Resource |
---|---|
https://blog.sonarsource.com/horde-webmail-account-takeover-via-email/ | Exploit Third Party Advisory |
https://github.com/horde/Mime_Viewer/commit/02b46cec1a7e8f1a6835b628850cd56b85963bb5 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/06/msg00007.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00021.html | Mailing List Third Party Advisory |
https://blog.sonarsource.com/horde-webmail-account-takeover-via-email/ | Exploit Third Party Advisory |
https://github.com/horde/Mime_Viewer/commit/02b46cec1a7e8f1a6835b628850cd56b85963bb5 | Patch Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/06/msg00007.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2022/08/msg00021.html | Mailing List Third Party Advisory |
https://lists.debian.org/debian-lts-announce/2024/10/msg00015.html |
Configurations
History
21 Nov 2024, 06:54
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
References | () https://blog.sonarsource.com/horde-webmail-account-takeover-via-email/ - Exploit, Third Party Advisory | |
References | () https://github.com/horde/Mime_Viewer/commit/02b46cec1a7e8f1a6835b628850cd56b85963bb5 - Patch, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/06/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2022/08/msg00021.html - Mailing List, Third Party Advisory |
Information
Published : 2022-03-11 07:15
Updated : 2024-11-21 06:54
NVD link : CVE-2022-26874
Mitre link : CVE-2022-26874
CVE.ORG link : CVE-2022-26874
JSON object : View
Products Affected
debian
- debian_linux
horde
- horde_mime_viewer
CWE
CWE-79
Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')