Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2019-12095

Опубликовано: 24 окт. 2019
Источник: debian
EPSS Низкий

Описание

Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server. NOTE: treanBookmarkTags could, for example, be a stored XSS payload.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-horde-treanunfixedpackage
php-hordefixed5.2.21+debian0-1package
php-hordefixed5.2.20+debian0-1+deb10u1busterpackage
php-hordefixed5.2.13+debian0-1+deb9u1stretchpackage

Примечания

  • https://github.com/horde/base/commit/81a7b53973506856db67e7f0b0263be29528aa75

  • https://bugs.horde.org/ticket/14926 (for the stored XSS)

  • Negligible impact for php-horde-trean, and unlikely that upstream will address

EPSS

Процентиль: 64%
0.00478
Низкий

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 6 лет назад

Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server. NOTE: treanBookmarkTags could, for example, be a stored XSS payload.

CVSS3: 8.8
nvd
больше 6 лет назад

Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server. NOTE: treanBookmarkTags could, for example, be a stored XSS payload.

github
больше 3 лет назад

Horde Trean, as used in Horde Groupware Webmail Edition through 5.2.22 and other products, allows CSRF, as demonstrated by the treanBookmarkTags parameter to the trean/ URI on a webmail server.

EPSS

Процентиль: 64%
0.00478
Низкий