icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons icons_061

Horde < 3.1 go.php url Parameter File Disclosure

Medium

Synopsis

The remote web server contains a PHP application that is affected by an information disclosure flaw.

Description

The remote web server contains a PHP application that is affected by an information disclosure flaw. The version of Horde installed on the remote host fails to validate input to the 'url' parameter of the 'services/go.php' script before using it to read files and return their contents. An unauthenticated attacker may be able to leverage this issue to retrieve the contents of arbitrary files on the affected host subject to the privileges of the web server user ID. This can result in the disclosure of authentication credentials used by the affected application as well as other sensitive information. Note that successful exploitation of this issue seems to require that PHP's 'magic_quotes_gpc' be disabled, although this has not been confirmed by the vendor.

Solution

Upgrade to version 3.1 or higher.