Lucene search

K
exploitpackSecuriTeamEXPLOITPACK:101BB3F0BCCEC60042574A48FE0F4083
HistoryAug 03, 2017 - 12:00 a.m.

Horde Groupware 5.2.21 - Unauthorized File Download

2017-08-0300:00:00
SecuriTeam
23

0.054 Low

EPSS

Percentile

93.2%

Horde Groupware 5.2.21 - Unauthorized File Download

## Vulnerability Summary
The following advisory describes an unauthorized file download vulnerability found in Horde Groupware version 5.2.21.

Horde Groupware Webmail Edition is โ€œa free, enterprise ready, browser based communication suite. Users can read, send and organize email messages and manage and share calendars, contacts, tasks, notes, files, and bookmarks with the standards compliant components from the Horde Project. Horde Groupware Webmail Edition bundles the separately available applications IMP, Ingo, Kronolith, Turba, Nag, Mnemo, Gollem, and Trean.โ€

## Credit
An independent security researcher, Juan Pablo Lopez Yacubian, has reported this vulnerability to Beyond Securityโ€™s SecuriTeam Secure Disclosure program.

## Vendor response
Horde Groupware was informed of the vulnerability, to which they response with:
โ€œthis has already been reported earlier by someone else, and is already fixed in the latest Gollem and Horde Groupware releases.

Besides that, itโ€™s not sufficient to have a list of the serverโ€™s users, you also need to exactly know the file name and path that you want to download. Finally, this only works on certain backends, where Horde alone is responsible for authentication, i.e. it wonโ€™t work with backends that require explicit authentication.โ€

CVE: CVE-2017-15235

## Vulnerability details
User controlled input is not sufficiently sanitized when passed to File Manager (gollem) module (version 3.0.11).

The โ€œfnโ€ parameter does not validate certain met characters by causing the requested file or filesystem to be downloaded without credentials.

It is only necessary to know the username and the file name.

## Proof of Concept


```
User = this is the username in horde
/ = the Meta character /
/services/download/?app=gollem&dir=%2Fhome%2Fuser&backend=sqlhome&fn=/test.php
```

0.054 Low

EPSS

Percentile

93.2%