Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2025-41066

Опубликовано: 02 дек. 2025
Источник: debian
EPSS Низкий

Описание

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
php-horde-groupwareunfixedpackage
php-horde-groupwareno-dsabookwormpackage
php-horde-groupwareno-dsabullseyepackage

Примечания

  • https://www.incibe.es/en/incibe-cert/notices/aviso/disclosure-sensitive-information-horde-groupware

EPSS

Процентиль: 17%
0.00055
Низкий

Связанные уязвимости

CVSS3: 5.3
ubuntu
2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
nvd
2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

CVSS3: 5.3
github
2 месяца назад

Horde Groupware v5.2.22 has a user enumeration vulnerability that allows an unauthenticated attacker to determine the existence of valid accounts on the system. To exploit the vulnerability, an HTTP request must be sent to ‘/imp/attachment.php’ including the parameters ‘id’ and ‘u’. If the specified user exists, the server will return the download of an empty file; if it does not exist, no download will be initiated, which unequivocally reveals the validity of the user.

EPSS

Процентиль: 17%
0.00055
Низкий