Horde Framework and Horde IMP /horde/imp/search.php cross site scripting

2006.08.23
Credit: Marc Ruef
Risk: Low
Local: No
Remote: Yes
CWE: CWE-Other


Ogólna skala CVSS: 4.3/10
Znaczenie: 2.9/10
Łatwość wykorzystania: 8.6/10
Wymagany dostęp: Zdalny
Złożoność ataku: Średnia
Autoryzacja: Nie wymagana
Wpływ na poufność: Brak
Wpływ na integralność: Częściowy
Wpływ na dostępność: Brak

Horde Framework and Horde IMP search.php cross site scripting scip AG Vulnerability ID 2457 (08/16/2006) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457 I. INTRODUCTION Horde is an open-source web application framework based on PHP. It offers popular applications, such as the Horde IMP mail client, a groupware and wiki solution. More information is available on the official Horde product web site at the following URL: http://www.horde.org/ II. DESCRIPTION Marc Ruef found several web-based vulnerabilities that were identified in Horde 3.0.4 and verified for all versions prior to 3.1.2 and IMP prior to 4.1.3. On IMP search screen, some of the given fields are vulnerable to a cross site scripting attack: <i>Virtual folder label:</i><input type="text" id="vfolder_label" name="vfolder_label" value=""><script>alert('scipAG');</script>" /> An attacker might be able to inject script code. However, it is important so see that this vulnerability is exploitable only with HTTP POST requests. If the attacker has an account on the local machine, they can create a shared folder that the victim has access to with a malicious name. III. EXPLOITATION Classic script injection techniques within a browser session can be used to exploit this vulnerabilities. [1, 2] A plugin for our open-source exploiting framework "Attack Tool Kit" (ATK) will be published in the near future. [3] IV. IMPACT Because non-authenticated parts of the software are affected too, this vulnerabilities are serious for every secure environment. Non-authenticated users might be able to exploit this flaw to gain elevated privileges (e.g. extracting sensitive cookie information or launch a buffer overflow attack against another web browser). The other parts are affecting authenticated parts. This requires a legitimate user to exploit the vulnerabilities. However, because cross site scripting attacks could be launched from external attackers, these vulnerabilities still become a high risk rating. V. DETECTION Detection of web based attacks requires a specialized web proxy and/or intrusion detection system. Patterns for such a detection are available and easy to implement. VI. SOLUTION The cross site scripting vulnerability (4) has been fixed in CVS HEAD (Juli 2006) and FRAMEWORK_3. The other vulnerabilities were addressed in the current release 3.1.2 and IMP 4.1.3. VII. VENDOR RESPONSE The Horde team has been informed at 07/04/2006 via email to security-at-horde.org. A first response came back on the same day. Several email messages were exchanged to discuss the vulnerabilities and to co-ordinate the disclosure of this advisory. VIII. SOURCES scip AG - Security Consulting Information Process (german) http://www.scip.ch scip AG Vulnerability Database (german) http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457 computec.ch document data base (german) http://www.computec.ch/download.php IX. DISCLOSURE TIMELINE 05/15/06 Identification of the vulnerabilities 07/04/06 Informing the Horde team 07/04/06 First reply of the Horde team 08/16/06 Public advisory IX. CREDITS The vulnerabilities were discovered by Marc Ruef. Marc Ruef, scip AG, Zuerich, Switzerland maru-at-scip.ch http://www.scip.ch A1. BIBLIOGRAPHY [1] http://www.computec.ch/download.php?view.812 [2] http://www.computec.ch/download.php?view.808 [3] http://www.computec.ch/projekte/atk/ A2. LEGAL NOTICES Copyright (c) 2006 scip AG, Switzerland. Permission is granted for the re-distribution of this alert. It may not be edited in any way without permission of scip AG. The information in the advisory is believed to be accurate at the time of publishing based on currently available information. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect or consequential loss or damage from use of or reliance on this advisory.


Vote for this issue:
50%
50%


 

Thanks for you vote!


 

Thanks for you comment!
Your message is in quarantine 48 hours.

Comment it here.


(*) - required fields.  
{{ x.nick }} | Date: {{ x.ux * 1000 | date:'yyyy-MM-dd' }} {{ x.ux * 1000 | date:'HH:mm' }} CET+1
{{ x.comment }}

Copyright 2024, cxsecurity.com

 

Back to Top