CNVD-2016-13004

Vulnerability from cnvd - Published: 2016-12-26
VLAI Severity ?
Title
Horde Groupware和Horde Groupware Webmail跨站脚本漏洞
Description
Horde Groupware和Horde Groupware Webmail Edition都是美国Horde公司产品。Horde Groupware是一款免费的基于协作套件的浏览器。Horde Groupware Webmail是一款免费的基于通信套件的企业浏览器。Horde Text Filter API是其中的一个用于过滤和转换文本的方法。 Horde Groupware和Horde Groupware Webmail 5.2.16之前的版本中的Horde Text Filter API存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。
Severity
Patch Name
Horde Groupware和Horde Groupware Webmail跨站脚本漏洞的补丁
Patch Description
Horde Groupware和Horde Groupware Webmail Edition都是美国Horde公司产品。Horde Groupware是一款免费的基于协作套件的浏览器。Horde Groupware Webmail是一款免费的基于通信套件的企业浏览器。Horde Text Filter API是其中的一个用于过滤和转换文本的方法。 Horde Groupware和Horde Groupware Webmail 5.2.16之前的版本中的Horde Text Filter API存在跨站脚本漏洞。远程攻击者可利用该漏洞注入任意的Web脚本或HTML。目前,供应商发布了安全公告及相关补丁信息,修复了此漏洞。
Formal description

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接: https://github.com/horde/horde/commit/4d8176d1e9ef5cbd2b3fcacd9b9a4c8e482fb424

Reference
http://marc.info/?l=horde-announce&m=147319089526753&w=2
Impacted products
Name
['Horde Groupware <5.2.16', 'Horde Groupware Webmail Edition <5.2.16']
Show details on source website

{
  "bids": {
    "bid": {
      "bidNumber": "94997"
    }
  },
  "cves": {
    "cve": {
      "cveNumber": "CVE-2016-5303"
    }
  },
  "description": "Horde Groupware\u548cHorde Groupware Webmail Edition\u90fd\u662f\u7f8e\u56fdHorde\u516c\u53f8\u4ea7\u54c1\u3002Horde Groupware\u662f\u4e00\u6b3e\u514d\u8d39\u7684\u57fa\u4e8e\u534f\u4f5c\u5957\u4ef6\u7684\u6d4f\u89c8\u5668\u3002Horde Groupware Webmail\u662f\u4e00\u6b3e\u514d\u8d39\u7684\u57fa\u4e8e\u901a\u4fe1\u5957\u4ef6\u7684\u4f01\u4e1a\u6d4f\u89c8\u5668\u3002Horde Text Filter API\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u8fc7\u6ee4\u548c\u8f6c\u6362\u6587\u672c\u7684\u65b9\u6cd5\u3002\r\n\r\nHorde Groupware\u548cHorde Groupware Webmail 5.2.16\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684Horde Text Filter API\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610f\u7684Web\u811a\u672c\u6216HTML\u3002",
  "discovererName": "Liuzhu",
  "formalWay": "\u76ee\u524d\u5382\u5546\u5df2\u7ecf\u53d1\u5e03\u4e86\u5347\u7ea7\u8865\u4e01\u4ee5\u4fee\u590d\u6b64\u5b89\u5168\u95ee\u9898\uff0c\u8865\u4e01\u83b7\u53d6\u94fe\u63a5\uff1a\r\nhttps://github.com/horde/horde/commit/4d8176d1e9ef5cbd2b3fcacd9b9a4c8e482fb424",
  "isEvent": "\u901a\u7528\u8f6f\u786c\u4ef6\u6f0f\u6d1e",
  "number": "CNVD-2016-13004",
  "openTime": "2016-12-26",
  "patchDescription": "Horde Groupware\u548cHorde Groupware Webmail Edition\u90fd\u662f\u7f8e\u56fdHorde\u516c\u53f8\u4ea7\u54c1\u3002Horde Groupware\u662f\u4e00\u6b3e\u514d\u8d39\u7684\u57fa\u4e8e\u534f\u4f5c\u5957\u4ef6\u7684\u6d4f\u89c8\u5668\u3002Horde Groupware Webmail\u662f\u4e00\u6b3e\u514d\u8d39\u7684\u57fa\u4e8e\u901a\u4fe1\u5957\u4ef6\u7684\u4f01\u4e1a\u6d4f\u89c8\u5668\u3002Horde Text Filter API\u662f\u5176\u4e2d\u7684\u4e00\u4e2a\u7528\u4e8e\u8fc7\u6ee4\u548c\u8f6c\u6362\u6587\u672c\u7684\u65b9\u6cd5\u3002\r\n\r\nHorde Groupware\u548cHorde Groupware Webmail 5.2.16\u4e4b\u524d\u7684\u7248\u672c\u4e2d\u7684Horde Text Filter API\u5b58\u5728\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u3002\u8fdc\u7a0b\u653b\u51fb\u8005\u53ef\u5229\u7528\u8be5\u6f0f\u6d1e\u6ce8\u5165\u4efb\u610f\u7684Web\u811a\u672c\u6216HTML\u3002\u76ee\u524d\uff0c\u4f9b\u5e94\u5546\u53d1\u5e03\u4e86\u5b89\u5168\u516c\u544a\u53ca\u76f8\u5173\u8865\u4e01\u4fe1\u606f\uff0c\u4fee\u590d\u4e86\u6b64\u6f0f\u6d1e\u3002",
  "patchName": "Horde Groupware\u548cHorde Groupware Webmail\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e\u7684\u8865\u4e01",
  "products": {
    "product": [
      "Horde Groupware \u003c5.2.16",
      "Horde Groupware Webmail Edition \u003c5.2.16"
    ]
  },
  "referenceLink": "http://marc.info/?l=horde-announce\u0026amp;m=147319089526753\u0026amp;w=2",
  "serverity": "\u4e2d",
  "submitTime": "2016-12-22",
  "title": "Horde Groupware\u548cHorde Groupware Webmail\u8de8\u7ad9\u811a\u672c\u6f0f\u6d1e"
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…