Korean
<< Back
VID 21927
Severity 30
Port 80, ...
Protocol TCP
Class CGI
Detailed Description The Horde Application Framework is vulnerable to a cross-site scripting vulnerability via the 'services/go.php' script. Horde Application Framework is an Web application framework written in PHP. Horde Application Framework versions 3.0.x prior to 3.0.11 and versions 3.1.x prior to 3.1.2 are vulnerable to multiple cross-site scripting vulnerabilities, caused by improper validation of user-supplied input passed to the 'url' parameter of the 'services/go.php' script, the 'module' parameter of the 'services/help/index.php' script, and the 'name' parameter of the 'services/problem.php' script. These vulnerabilities could permit a remote attacker to create a malicious URI link that includes hostile HTML and script code. If this link were to be followed, the hostile code may be rendered in the web browser of the victim user. This would occur in the security context of the affected web site and may allow for theft of cookie-based authentication credentials or other attacks.

* References:
http://lists.horde.org/archives/announce/2006/000287.html
http://lists.horde.org/archives/announce/2006/000288.html
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047687.html
http://securitytracker.com/alerts/2006/Jul/1016442.html
http://secunia.com/advisories/20954/

* Platforms Affected:
Horde Project, Horde versions 3.0.x prior to 3.0.11
Horde Project, Horde versions 3.1.x prior to 3.1.2
Any operating system Any version
Recommendation Upgrade to the latest version of Horde Application Framework (3.0.11 or 3.1.2 or later) or apply the patches, available from the Horde Web site at http://www.horde.org/horde/
Related URL CVE-2006-3548 (CVE)
Related URL 18845 (SecurityFocus)
Related URL 27589 (ISS)