GLSA-200604-02 : Horde Application Framework: Remote code execution

This script is Copyright (C) 2006-2015 Tenable Network Security, Inc.

Synopsis :

The remote Gentoo host is missing one or more security-related

Description :

The remote host is affected by the vulnerability described in GLSA-200604-02
(Horde Application Framework: Remote code execution)

Jan Schneider of the Horde team discovered a vulnerability in the
help viewer of the Horde Application Framework that could allow remote
code execution (CVE-2006-1491). Paul Craig reported that
'services/go.php' fails to validate the passed URL parameter correctly

Impact :

An attacker could exploit the vulnerability in the help viewer to
execute arbitrary code with the privileges of the web server user. By
embedding a NULL character in the URL parameter, an attacker could
exploit the input validation issue in go.php to read arbitrary files.

Workaround :

There are no known workarounds at this time.

See also :

Solution :

All Horde Application Framework users should upgrade to the latest
# emerge --sync
# emerge --ask --oneshot --verbose '>=www-apps/horde-3.1.1'

Risk factor :

High / CVSS Base Score : 7.5
Public Exploit Available : true

Family: Gentoo Local Security Checks

Nessus Plugin ID: 21195 (gentoo_GLSA-200604-02.nasl)

Bugtraq ID:

CVE ID: CVE-2006-1260

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now