CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
78.9%
The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
Vendor | Product | Version | CPE |
---|---|---|---|
horde | application_framework | 3.2 | cpe:2.3:a:horde:application_framework:3.2:*:*:*:*:*:*:* |
horde | application_framework | 3.2.1 | cpe:2.3:a:horde:application_framework:3.2.1:*:*:*:*:*:*:* |
horde | application_framework | 3.2.2 | cpe:2.3:a:horde:application_framework:3.2.2:*:*:*:*:*:*:* |
horde | application_framework | 3.2.3 | cpe:2.3:a:horde:application_framework:3.2.3:*:*:*:*:*:*:* |
horde | application_framework | 3.2.4 | cpe:2.3:a:horde:application_framework:3.2.4:*:*:*:*:*:*:* |
horde | application_framework | 3.3 | cpe:2.3:a:horde:application_framework:3.3:*:*:*:*:*:*:* |
horde | application_framework | 3.3.1 | cpe:2.3:a:horde:application_framework:3.3.1:*:*:*:*:*:*:* |
horde | application_framework | 3.3.2 | cpe:2.3:a:horde:application_framework:3.3.2:*:*:*:*:*:*:* |
horde | application_framework | 3.3.3 | cpe:2.3:a:horde:application_framework:3.3.3:*:*:*:*:*:*:* |
horde | application_framework | 3.3.4 | cpe:2.3:a:horde:application_framework:3.3.4:*:*:*:*:*:*:* |
marc.info/?l=horde-announce&m=125291625030436&w=2
marc.info/?l=horde-announce&m=125292088004087&w=2
marc.info/?l=horde-announce&m=125292314007049&w=2
marc.info/?l=horde-announce&m=125292339907481&w=2
marc.info/?l=horde-announce&m=125294558611682&w=2
marc.info/?l=horde-announce&m=125295852706029&w=2
secunia.com/advisories/36665
secunia.com/advisories/36882
www.debian.org/security/2009/dsa-1897
www.osvdb.org/58107
exchange.xforce.ibmcloud.com/vulnerabilities/53202