Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2017-16908

Опубликовано: 20 нояб. 2017
Источник: debian

Описание

In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-horde-kronolithfixed4.2.24-1package
php-horde-kronolithnot-affectedjessiepackage

Примечания

  • http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html

  • https://bugs.horde.org/ticket/14857

  • https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716

Связанные уязвимости

CVSS3: 5.4
ubuntu
около 8 лет назад

In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.

CVSS3: 5.4
nvd
около 8 лет назад

In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.

CVSS3: 5.4
github
больше 3 лет назад

In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.