CVE-2009-3701 (GCVE-0-2009-3701)

Vulnerability from cvelistv5 – Published: 2009-12-21 16:00 – Updated: 2024-08-07 06:38
VLAI?
Summary
Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T06:38:30.163Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "37823",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37823"
          },
          {
            "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
          },
          {
            "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
          },
          {
            "name": "[announce] 20091215 Horde 3.3.6 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://lists.horde.org/archives/announce/2009/000529.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
          },
          {
            "name": "ADV-2009-3549",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3549"
          },
          {
            "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
          },
          {
            "name": "horde-admininterface-xss(54817)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
          },
          {
            "name": "37351",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37351"
          },
          {
            "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
            "tags": [
              "mailing-list",
              "x_refsource_MLIST",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
          },
          {
            "name": "37709",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37709"
          },
          {
            "name": "ADV-2009-3572",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3572"
          },
          {
            "name": "1023365",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1023365"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-10T18:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "37823",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37823"
        },
        {
          "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
        },
        {
          "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
        },
        {
          "name": "[announce] 20091215 Horde 3.3.6 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://lists.horde.org/archives/announce/2009/000529.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
        },
        {
          "name": "ADV-2009-3549",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3549"
        },
        {
          "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
        },
        {
          "name": "horde-admininterface-xss(54817)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
        },
        {
          "name": "37351",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37351"
        },
        {
          "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
          "tags": [
            "mailing-list",
            "x_refsource_MLIST"
          ],
          "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
        },
        {
          "name": "37709",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37709"
        },
        {
          "name": "ADV-2009-3572",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3572"
        },
        {
          "name": "1023365",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1023365"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-3701",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "37823",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37823"
            },
            {
              "name": "[announce] 20091216 Horde Groupware 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2"
            },
            {
              "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
              "refsource": "FULLDISC",
              "url": "http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html"
            },
            {
              "name": "[announce] 20091215 Horde 3.3.6 (final)",
              "refsource": "MLIST",
              "url": "http://lists.horde.org/archives/announce/2009/000529.html"
            },
            {
              "name": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h",
              "refsource": "CONFIRM",
              "url": "http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h"
            },
            {
              "name": "ADV-2009-3549",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3549"
            },
            {
              "name": "20091217 [ISecAuditors Security Advisories] Horde 3.3.5 \"PHP_SELF\" Cross-Site Scripting vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/508531/100/0/threaded"
            },
            {
              "name": "horde-admininterface-xss(54817)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/54817"
            },
            {
              "name": "37351",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37351"
            },
            {
              "name": "[announce] 20091217 Horde Groupware Webmail Edition 1.2.5 (final)",
              "refsource": "MLIST",
              "url": "http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2"
            },
            {
              "name": "37709",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37709"
            },
            {
              "name": "ADV-2009-3572",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3572"
            },
            {
              "name": "1023365",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1023365"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-3701",
    "datePublished": "2009-12-21T16:00:00",
    "dateReserved": "2009-10-15T00:00:00",
    "dateUpdated": "2024-08-07T06:38:30.163Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"3.3.5\", \"matchCriteriaId\": \"5CD5438E-7D99-4286-81F3-1A304E9A7BDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ACBE1BB3-EAB6-4388-95C2-0513B0D6A327\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8B402F70-BAAD-44D6-B414-F615F973DC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1F2DA0C-C8A3-429C-83C7-B2983D3FF148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A14A770E-60BC-4698-8BFC-5FB745A52279\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"23A0AA21-C88D-45C4-9D95-414B2278E601\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C91CA767-F49D-48E9-80CE-78B65DD14DF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CEC8BBFC-263E-4735-847D-5544D18922E4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8DB1F389-5D64-4B8C-B207-7D23F0C12DBE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BE8892DF-11F2-4991-97E8-D561DEAC4F5B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3B46B6F5-055E-44EB-BB78-503811C0E57C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66B197B0-F3B7-40D6-9872-C1A94622C242\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2698E2D7-09BF-4490-B362-4245CD3087D1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A3B40A46-117D-4D85-8CC8-27236A3280C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FEFBECFF-D1A4-465D-B59F-E70246DE4BE7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"57ABD1BD-6676-4B54-9F3E-FACF1346794F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"79EC6167-5D16-4236-8EBC-412EE1784802\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A4F6A2A-05B6-42EA-8F61-D0AB610A6757\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D1F91CDA-B425-4DB2-89E4-12267B600D13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A8BB743-A760-4C72-880C-759E54FB7CF1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"89477FCC-C925-418A-A3FF-F5B02736600C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5862181-4CE7-452F-8877-41E099440188\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3E601FE-94F1-48AD-A0F2-42824A3A4FC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5CF33A8-C497-4C86-8C5D-7181597BEC53\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"30B312DB-14BE-425C-9B07-0CBED6F39E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.2.4\", \"matchCriteriaId\": \"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71C2653B-7F0B-4628-9E77-44744BC05463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B574D428-0A3A-47CA-A926-5C936F83919A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BBB036-494E-41D4-BD04-40906FAB5C60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A849DD3E-882A-4621-BB6C-315A76677BB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB711B5E-9011-4BA2-917A-DB8545705E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50DC1068-F426-497F-A5A0-E032BC3816F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\", \"versionEndIncluding\": \"1.2.4\", \"matchCriteriaId\": \"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"71C2653B-7F0B-4628-9E77-44744BC05463\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"E55009DF-EDF1-4FAE-88E7-1CF33BFFEBC7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"980162BB-48B3-4921-987A-6D18C62965A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B574D428-0A3A-47CA-A926-5C936F83919A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C95E9B57-2DB0-4692-A7D1-180EC3687D1B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E7D8683-8DD4-4EB0-A28F-0C556304BB2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9F68E5D5-7812-4FB2-ACF9-76180B038D80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BBB036-494E-41D4-BD04-40906FAB5C60\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"37B76B27-ADF0-4E88-B92C-304FB38A356E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*\", \"matchCriteriaId\": \"965F245A-879A-4DF0-ABC5-588E78C4CBBD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*\", \"matchCriteriaId\": \"3DCB29F9-3875-4264-8117-5751FEDC3350\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*\", \"matchCriteriaId\": \"59FC250F-EF0B-4604-99A2-3EEB8B2DEB77\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A849DD3E-882A-4621-BB6C-315A76677BB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AAF1A6AE-0748-476B-ACE2-DA43A9443B7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"AB711B5E-9011-4BA2-917A-DB8545705E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"50DC1068-F426-497F-A5A0-E032BC3816F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*\", \"matchCriteriaId\": \"F577A169-8354-4218-B3C6-04DA4BDF1E3C\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.\"}, {\"lang\": \"es\", \"value\": \"M\\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el interfaz de administraci\\u00f3n en Horde Application Framework versiones anteriores a v3.3.6, Horde Groupware versiones anteriores a v1.2.5, y Horde Groupware Webmail Edition versiones anteriores a v1.2.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\\u00f3n mediante el PATH_INFO en (1) phpshell.php, (2) cmdshell.php, o (3) sqlshell.php en admin/, relacionado con la variable PHP_SELF.\"}]",
      "id": "CVE-2009-3701",
      "lastModified": "2024-11-21T01:07:59.707",
      "metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
      "published": "2009-12-21T16:30:00.233",
      "references": "[{\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.horde.org/archives/announce/2009/000529.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/37709\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37823\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1023365\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/archive/1/508531/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/37351\", \"source\": \"cve@mitre.org\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3549\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3572\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/54817\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.horde.org/archives/announce/2009/000529.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://secunia.com/advisories/37709\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://secunia.com/advisories/37823\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://securitytracker.com/id?1023365\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/archive/1/508531/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/37351\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3549\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"http://www.vupen.com/english/advisories/2009/3572\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\", \"Vendor Advisory\"]}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/54817\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
      "sourceIdentifier": "cve@mitre.org",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-3701\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-12-21T16:30:00.233\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Multiple cross-site scripting (XSS) vulnerabilities in the administration interface in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 allow remote attackers to inject arbitrary web script or HTML via the PATH_INFO to (1) phpshell.php, (2) cmdshell.php, or (3) sqlshell.php in admin/, related to the PHP_SELF variable.\"},{\"lang\":\"es\",\"value\":\"M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en el interfaz de administraci\u00f3n en Horde Application Framework versiones anteriores a v3.3.6, Horde Groupware versiones anteriores a v1.2.5, y Horde Groupware Webmail Edition versiones anteriores a v1.2.5 permite a atacantes remotos inyectar secuencias de comandos web o HTML de su elecci\u00f3n mediante el PATH_INFO en (1) phpshell.php, (2) cmdshell.php, o (3) sqlshell.php en admin/, relacionado con la variable PHP_SELF.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"3.3.5\",\"matchCriteriaId\":\"5CD5438E-7D99-4286-81F3-1A304E9A7BDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D3532FD-0E85-4EDC-A3A7-76F8BA915B6C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D39B3B91-16B9-4B5B-AB4E-9BA568CC1E5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACBE1BB3-EAB6-4388-95C2-0513B0D6A327\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B402F70-BAAD-44D6-B414-F615F973DC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1F2DA0C-C8A3-429C-83C7-B2983D3FF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7535FE38-0FBD-48CC-9FDE-C7CA2C18CA24\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A14A770E-60BC-4698-8BFC-5FB745A52279\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.4_rc1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23A0AA21-C88D-45C4-9D95-414B2278E601\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8AE35AF8-CA38-42FB-BA32-057BCA2CA2AD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91CA767-F49D-48E9-80CE-78B65DD14DF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEC8BBFC-263E-4735-847D-5544D18922E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8DB1F389-5D64-4B8C-B207-7D23F0C12DBE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE8892DF-11F2-4991-97E8-D561DEAC4F5B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3B46B6F5-055E-44EB-BB78-503811C0E57C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B197B0-F3B7-40D6-9872-C1A94622C242\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2698E2D7-09BF-4490-B362-4245CD3087D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3B40A46-117D-4D85-8CC8-27236A3280C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEFBECFF-D1A4-465D-B59F-E70246DE4BE7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"57ABD1BD-6676-4B54-9F3E-FACF1346794F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79EC6167-5D16-4236-8EBC-412EE1784802\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A4F6A2A-05B6-42EA-8F61-D0AB610A6757\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1F91CDA-B425-4DB2-89E4-12267B600D13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A8BB743-A760-4C72-880C-759E54FB7CF1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"89477FCC-C925-418A-A3FF-F5B02736600C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5862181-4CE7-452F-8877-41E099440188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3E601FE-94F1-48AD-A0F2-42824A3A4FC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDE2B06C-EDBD-4FA1-90AA-148E39EF5AE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5CF33A8-C497-4C86-8C5D-7181597BEC53\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"30B312DB-14BE-425C-9B07-0CBED6F39E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2CF2865-CA12-4C4C-9BEC-7A97E6AAB377\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF389AE4-D2AD-4992-BFBD-68FB1CBEE50B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.4\",\"matchCriteriaId\":\"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C2653B-7F0B-4628-9E77-44744BC05463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574D428-0A3A-47CA-A926-5C936F83919A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBB036-494E-41D4-BD04-40906FAB5C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A849DD3E-882A-4621-BB6C-315A76677BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB711B5E-9011-4BA2-917A-DB8545705E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC1068-F426-497F-A5A0-E032BC3816F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"1.2.4\",\"matchCriteriaId\":\"5611B7D8-8AEF-42A8-8132-39CE773A7C18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"71C2653B-7F0B-4628-9E77-44744BC05463\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"E55009DF-EDF1-4FAE-88E7-1CF33BFFEBC7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"980162BB-48B3-4921-987A-6D18C62965A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DC241F01-B9DF-4D0E-BA3C-3523AEEB6BCF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B574D428-0A3A-47CA-A926-5C936F83919A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D59C23FB-E223-4EED-8F69-3CC1EE7DF148\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"904EEFF0-CF66-43E6-BAA9-1A6FB4115CB3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B3AB0176-9CB3-4D49-B644-2C413C9B6E13\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C95E9B57-2DB0-4692-A7D1-180EC3687D1B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E7D8683-8DD4-4EB0-A28F-0C556304BB2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9F68E5D5-7812-4FB2-ACF9-76180B038D80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBB036-494E-41D4-BD04-40906FAB5C60\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"37B76B27-ADF0-4E88-B92C-304FB38A356E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"965F245A-879A-4DF0-ABC5-588E78C4CBBD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DCB29F9-3875-4264-8117-5751FEDC3350\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1:rc4:*:*:*:*:*:*\",\"matchCriteriaId\":\"59FC250F-EF0B-4604-99A2-3EEB8B2DEB77\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1C10E681-5D2B-4EA4-B8E1-C0CA4FC9D3FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19CC5154-42C5-4877-9147-5DFD61BD5CDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62AAEBBF-1696-4EAC-8837-68A03C2D2F5F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F626876D-99FC-4DE0-BEE0-35874C4E25F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A849DD3E-882A-4621-BB6C-315A76677BB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAF1A6AE-0748-476B-ACE2-DA43A9443B7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB711B5E-9011-4BA2-917A-DB8545705E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"50DC1068-F426-497F-A5A0-E032BC3816F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2C5A176-8C72-40EA-85AC-F11B40FD53A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CB4C3487-4556-47E5-8BF3-1DEDF0E9AFEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78F24E43-491B-4AD1-B905-66F7FC6DA98D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"F577A169-8354-4218-B3C6-04DA4BDF1E3C\"}]}]}],\"references\":[{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.horde.org/archives/announce/2009/000529.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37709\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37823\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023365\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/archive/1/508531/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/37351\",\"source\":\"cve@mitre.org\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3549\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3572\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54817\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2009-12/0388.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.559\u0026r2=1.515.2.589\u0026ty=h\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.horde.org/archives/announce/2009/000529.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126100750018478\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=horde-announce\u0026m=126101076422179\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://secunia.com/advisories/37709\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://secunia.com/advisories/37823\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://securitytracker.com/id?1023365\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/archive/1/508531/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/37351\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3549\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"http://www.vupen.com/english/advisories/2009/3572\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/54817\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…