CVE-2009-3237 (GCVE-0-2009-3237)
Vulnerability from cvelistv5 – Published: 2009-09-17 10:00 – Updated: 2024-08-07 06:22
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME "text parts" that are not properly handled in the MIME viewer library (config/mime_drivers.php).
Severity ?
No CVSS data available.
CWE
- n/a
Assigner
References
| URL | Tags | |||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-07T06:22:23.290Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
},
{
"name": "36665",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/36665"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.horde.org/ticket/?id=8311"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://bugs.horde.org/ticket/?id=8399"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
},
{
"name": "horde-mimeviewer-xss(53200)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
},
{
"name": "58109",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/58109"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
},
{
"name": "58108",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/58108"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2009-09-14T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME \"text parts\" that are not properly handled in the MIME viewer library (config/mime_drivers.php)."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-08-16T14:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
},
{
"name": "36665",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/36665"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.horde.org/ticket/?id=8311"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://bugs.horde.org/ticket/?id=8399"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
},
{
"name": "horde-mimeviewer-xss(53200)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
},
{
"name": "58109",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/58109"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
},
{
"name": "58108",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/58108"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-3237",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME \"text parts\" that are not properly handled in the MIME viewer library (config/mime_drivers.php)."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2"
},
{
"name": "36665",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/36665"
},
{
"name": "http://bugs.horde.org/ticket/?id=8311",
"refsource": "CONFIRM",
"url": "http://bugs.horde.org/ticket/?id=8311"
},
{
"name": "http://bugs.horde.org/ticket/?id=8399",
"refsource": "CONFIRM",
"url": "http://bugs.horde.org/ticket/?id=8399"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2"
},
{
"name": "horde-mimeviewer-xss(53200)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/53202"
},
{
"name": "58109",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/58109"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2"
},
{
"name": "58108",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/58108"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2"
},
{
"name": "[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)",
"refsource": "MLIST",
"url": "http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2009-3237",
"datePublished": "2009-09-17T10:00:00",
"dateReserved": "2009-09-16T00:00:00",
"dateUpdated": "2024-08-07T06:22:23.290Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"88BE4BD4-174C-4EC5-BCE7-CA63D1369043\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0D32C974-121E-4FAB-8E39-2933C912935F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"60A02DC9-3602-43B2-8574-15A6D4528142\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"61F847C8-7775-4FC0-BBE1-C56DFC3D9A63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1ECC0C8-DE09-4079-8476-B0C82ABE980A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8ADA6AAC-7511-47F6-B805-A5C48BA4CD11\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B3CB720-A1C0-4E49-BA2C-02283499F252\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3CE83C51-175E-4FB9-BA2B-505A8B559D44\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"172260F8-D4E5-470D-84EA-00B88B090A8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_application_framework:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"51487521-E1DB-4CD0-9071-C9449EFB681E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"26FB18AE-EDA5-48DF-9592-9970FFD3C72F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30FF79BF-E978-49BF-BF07-DF4A75C6E52F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"633B142D-AAF2-49EE-B152-C1C4524E4543\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8CFFA11-C38E-4F92-8BF2-223B97911E0B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4C4151CC-DC68-4883-91E2-712D9FD0C160\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F359B33-A791-4792-9CD3-BA551F1291DB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F105C6-75E5-4BD8-A7A2-0DB31B6F5498\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2187B702-3598-4353-81AA-EBDCC3E48A97\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:horde_groupware:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"52D84C54-EAFF-4368-ADEF-589F95EA6BD5\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BBB036-494E-41D4-BD04-40906FAB5C60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"37B76B27-ADF0-4E88-B92C-304FB38A356E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"965F245A-879A-4DF0-ABC5-588E78C4CBBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DCB29F9-3875-4264-8117-5751FEDC3350\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"59FC250F-EF0B-4604-99A2-3EEB8B2DEB77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAF1A6AE-0748-476B-ACE2-DA43A9443B7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB711B5E-9011-4BA2-917A-DB8545705E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50DC1068-F426-497F-A5A0-E032BC3816F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F577A169-8354-4218-B3C6-04DA4BDF1E3C\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME \\\"text parts\\\" that are not properly handled in the MIME viewer library (config/mime_drivers.php).\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiple vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Horde Application Framework desde v3.2 anteriores a v3.2.5 y desde v3.3 anteriores a v3.3.5; Groupware desde v1.1 anteriores a v1.1.6 y 1.2 anteriores a v1.2.4; y Groupware Webmail Edition desde v1.1 anteriores a v1.1.6 y desde v1.2 anteriores a v1.2.4; permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\\u00e9s de (1) preferencias num\\u00e9ricas manipuladas que no han sido adecuadamente gestionadas en el sistema de preferencias (services/prefs.php), como quedo demostrado por el par\\u00e1metro sidebar_width o (2) \\\"fragmentos de texto\\\" MIME desconocidos manipulados que no son gestionados adecuadamente por la librer\\u00eda de visor de MIME (config/mime_drivers.php).\"}]",
"id": "CVE-2009-3237",
"lastModified": "2024-11-21T01:06:52.030",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2009-09-17T10:30:01.390",
"references": "[{\"url\": \"http://bugs.horde.org/ticket/?id=8311\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.horde.org/ticket/?id=8399\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/36665\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/58108\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/58109\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53202\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://bugs.horde.org/ticket/?id=8311\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://bugs.horde.org/ticket/?id=8399\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/36665\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.osvdb.org/58108\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/58109\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/53202\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2009-3237\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-09-17T10:30:01.390\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME \\\"text parts\\\" that are not properly handled in the MIME viewer library (config/mime_drivers.php).\"},{\"lang\":\"es\",\"value\":\"M\u00faltiple vulnerabilidad de secuencias de comandos en sitios cruzados (XSS) en Horde Application Framework desde v3.2 anteriores a v3.2.5 y desde v3.3 anteriores a v3.3.5; Groupware desde v1.1 anteriores a v1.1.6 y 1.2 anteriores a v1.2.4; y Groupware Webmail Edition desde v1.1 anteriores a v1.1.6 y desde v1.2 anteriores a v1.2.4; permite a atacantes remotos inyectar secuencias de comandos web o HTML de forma arbitraria a trav\u00e9s de (1) preferencias num\u00e9ricas manipuladas que no han sido adecuadamente gestionadas en el sistema de preferencias (services/prefs.php), como quedo demostrado por el par\u00e1metro sidebar_width o (2) \\\"fragmentos de texto\\\" MIME desconocidos manipulados que no son gestionados adecuadamente por la librer\u00eda de visor de MIME (config/mime_drivers.php).\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"88BE4BD4-174C-4EC5-BCE7-CA63D1369043\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0D32C974-121E-4FAB-8E39-2933C912935F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"60A02DC9-3602-43B2-8574-15A6D4528142\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61F847C8-7775-4FC0-BBE1-C56DFC3D9A63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1ECC0C8-DE09-4079-8476-B0C82ABE980A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8ADA6AAC-7511-47F6-B805-A5C48BA4CD11\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3CB720-A1C0-4E49-BA2C-02283499F252\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CE83C51-175E-4FB9-BA2B-505A8B559D44\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"172260F8-D4E5-470D-84EA-00B88B090A8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_application_framework:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51487521-E1DB-4CD0-9071-C9449EFB681E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"26FB18AE-EDA5-48DF-9592-9970FFD3C72F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30FF79BF-E978-49BF-BF07-DF4A75C6E52F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"633B142D-AAF2-49EE-B152-C1C4524E4543\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8CFFA11-C38E-4F92-8BF2-223B97911E0B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C4151CC-DC68-4883-91E2-712D9FD0C160\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F359B33-A791-4792-9CD3-BA551F1291DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F105C6-75E5-4BD8-A7A2-0DB31B6F5498\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2187B702-3598-4353-81AA-EBDCC3E48A97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:horde_groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"52D84C54-EAFF-4368-ADEF-589F95EA6BD5\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBB036-494E-41D4-BD04-40906FAB5C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B76B27-ADF0-4E88-B92C-304FB38A356E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"965F245A-879A-4DF0-ABC5-588E78C4CBBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCB29F9-3875-4264-8117-5751FEDC3350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FC250F-EF0B-4604-99A2-3EEB8B2DEB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF1A6AE-0748-476B-ACE2-DA43A9443B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB711B5E-9011-4BA2-917A-DB8545705E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC1068-F426-497F-A5A0-E032BC3816F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F577A169-8354-4218-B3C6-04DA4BDF1E3C\"}]}]}],\"references\":[{\"url\":\"http://bugs.horde.org/ticket/?id=8311\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.horde.org/ticket/?id=8399\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/36665\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/58108\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/58109\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53202\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://bugs.horde.org/ticket/?id=8311\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://bugs.horde.org/ticket/?id=8399\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125291625030436\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292088004087\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292314007049\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125292339907481\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125294558611682\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=125295852706029\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/36665\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.osvdb.org/58108\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/58109\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/53202\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…