GLSA-200604-02 : Horde Application Framework: Remote code execution

This script is Copyright (C) 2006-2014 Tenable Network Security, Inc.


Synopsis :

The remote Gentoo host is missing one or more security-related
patches.

Description :

The remote host is affected by the vulnerability described in GLSA-200604-02
(Horde Application Framework: Remote code execution)

Jan Schneider of the Horde team discovered a vulnerability in the
help viewer of the Horde Application Framework that could allow remote
code execution (CVE-2006-1491). Paul Craig reported that
'services/go.php' fails to validate the passed URL parameter correctly
(CVE-2006-1260).

Impact :

An attacker could exploit the vulnerability in the help viewer to
execute arbitrary code with the privileges of the web server user. By
embedding a NULL character in the URL parameter, an attacker could
exploit the input validation issue in go.php to read arbitrary files.

Workaround :

There are no known workarounds at this time.

See also :

http://lists.horde.org/archives/announce/2006/000271.html
http://www.gentoo.org/security/en/glsa/glsa-200604-02.xml

Solution :

All Horde Application Framework users should upgrade to the latest
version:
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/horde-3.1.1'

Risk factor :

High / CVSS Base Score : 7.5
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P)
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 21195 (gentoo_GLSA-200604-02.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1260
CVE-2006-1491