Debian DSA-1966-1 : horde3 - insufficient input sanitising

medium Nessus Plugin ID 44831

Language:

New! Vulnerability Priority Rating (VPR)

Tenable calculates a dynamic VPR for every vulnerability. VPR combines vulnerability information with threat intelligence and machine learning algorithms to predict which vulnerabilities are most likely to be exploited in attacks. Read more about what VPR is and how it is different from CVSS.

VPR Score: 3.8

Synopsis

The remote Debian host is missing a security-related update.

Description

Several vulnerabilities have been found in horde3, the horde web application framework. The Common Vulnerabilities and Exposures project identifies the following problems :

- CVE-2009-3237 It has been discovered that horde3 is prone to cross-site scripting attacks via crafted number preferences or inline MIME text parts when using text/plain as MIME type. For lenny this issue was already fixed, but as an additional security precaution, the display of inline text was disabled in the configuration file.

- CVE-2009-3701 It has been discovered that the horde3 administration interface is prone to cross-site scripting attacks due to the use of the PHP_SELF variable. This issue can only be exploited by authenticated administrators.

- CVE-2009-4363 It has been discovered that horde3 is prone to several cross-site scripting attacks via crafted data:text/html values in HTML messages.

Solution

Upgrade the horde3 packages.

For the stable distribution (lenny), these problems have been fixed in version 3.2.2+debian0-2+lenny2.

For the oldstable distribution (etch), these problems have been fixed in version 3.1.3-4etch7.

See Also

https://security-tracker.debian.org/tracker/CVE-2009-3237

https://security-tracker.debian.org/tracker/CVE-2009-3701

https://security-tracker.debian.org/tracker/CVE-2009-4363

https://www.debian.org/security/2010/dsa-1966

Plugin Details

Severity: Medium

ID: 44831

File Name: debian_DSA-1966.nasl

Version: 1.12

Type: local

Agent: unix

Published: 2/24/2010

Updated: 1/4/2021

Dependencies: ssh_get_info.nasl

Risk Information

Risk Factor: Medium

VPR Score: 3.8

CVSS v2.0

Base Score: 4.3

Temporal Score: 3.4

Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Temporal Vector: E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:horde3, cpe:/o:debian:debian_linux:4.0, cpe:/o:debian:debian_linux:5.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/7/2010

Reference Information

CVE: CVE-2009-3237, CVE-2009-3701, CVE-2009-4363

BID: 37351

DSA: 1966

CWE: 79