Lucene search

K
gentooGentoo FoundationGLSA-200604-02
HistoryApr 04, 2006 - 12:00 a.m.

Horde Application Framework: Remote code execution

2006-04-0400:00:00
Gentoo Foundation
security.gentoo.org
9

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.351 Low

EPSS

Percentile

97.1%

Background

The Horde Application Framework is a general-purpose web application framework written in PHP, providing classes for handling preferences, compression, browser detection, connection tracking, MIME and more.

Description

Jan Schneider of the Horde team discovered a vulnerability in the help viewer of the Horde Application Framework that could allow remote code execution (CVE-2006-1491). Paul Craig reported that “services/go.php” fails to validate the passed URL parameter correctly (CVE-2006-1260).

Impact

An attacker could exploit the vulnerability in the help viewer to execute arbitrary code with the privileges of the web server user. By embedding a NULL character in the URL parameter, an attacker could exploit the input validation issue in go.php to read arbitrary files.

Workaround

There are no known workarounds at this time.

Resolution

All Horde Application Framework users should upgrade to the latest version:

 # emerge --sync
 # emerge --ask --oneshot --verbose ">=www-apps/horde-3.1.1"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/horde< 3.1.1UNKNOWN

7.5 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.351 Low

EPSS

Percentile

97.1%