The remote server is running at least one instance of Horde IMP version 3.2.4 or lower which is vulnerable to HTML+TIME XSS attack
Reporter | Title | Published | Views | Family All 9 |
---|---|---|---|---|
![]() | CVE-2004-1443 | 13 Feb 200505:00 | – | cve |
![]() | IMP HTML+TIME XSS Vulnerability | 3 Nov 200500:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200408-07 (horde-imp) | 24 Sep 200800:00 | – | openvas |
![]() | Gentoo Security Advisory GLSA 200408-07 (horde-imp) | 24 Sep 200800:00 | – | openvas |
![]() | CVE-2004-1443 | 13 Feb 200505:00 | – | cvelist |
![]() | Horde-IMP: Input validation vulnerability for Internet Explorer users | 10 Aug 200400:00 | – | gentoo |
![]() | GLSA-200408-07 : Horde-IMP: Input validation vulnerability for Internet Explorer users | 30 Aug 200400:00 | – | nessus |
![]() | Horde IMP with MSIE MIME Viewer Email Message XSS | 30 Jul 200400:00 | – | nessus |
![]() | CVE-2004-1443 | 31 Dec 200405:00 | – | nvd |
Source | Link |
---|---|
greymagic | www.greymagic.com/security/advisories/gm005-mc/ |
securityfocus | www.securityfocus.com/bid/10845 |
# SPDX-FileCopyrightText: 2004 George A. Theall
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only
CPE = "cpe:/a:horde:imp";
if(description)
{
script_oid("1.3.6.1.4.1.25623.1.0.13857");
script_version("2023-08-01T13:29:10+0000");
script_tag(name:"last_modification", value:"2023-08-01 13:29:10 +0000 (Tue, 01 Aug 2023)");
script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
script_tag(name:"cvss_base", value:"4.3");
script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_cve_id("CVE-2004-1443");
script_xref(name:"OSVDB", value:"8293");
script_name("Horde IMP HTML+TIME XSS Vulnerability");
script_category(ACT_GATHER_INFO);
script_copyright("Copyright (C) 2004 George A. Theall");
script_family("Web application abuses");
script_dependencies("imp_detect.nasl");
script_mandatory_keys("horde/imp/detected");
script_xref(name:"URL", value:"http://www.greymagic.com/security/advisories/gm005-mc/");
script_xref(name:"URL", value:"http://www.securityfocus.com/bid/10845");
script_tag(name:"summary", value:"The remote server is running at least one instance of Horde IMP whose
version number is 3.2.4 or lower.");
script_tag(name:"insight", value:"Such versions are vulnerable to a cross-scripting attack whereby an attacker
may be able to inject arbitrary content, including script, in a specially crafted MIME message. To have an effect,
the victim must be using Internet Explorer to access IMP and be using the inline MIME viewer for HTML messages.
This vulnerability is a variation on the one reported in the referenced links.");
script_tag(name:"solution", value:"Upgrade to Horde IMP version 3.2.5 or later.");
script_tag(name:"solution_type", value:"VendorFix");
script_tag(name:"qod_type", value:"remote_banner_unreliable");
exit(0);
}
include("version_func.inc");
include("host_details.inc");
if( ! port = get_app_port( cpe:CPE ) ) exit( 0 );
if( ! info = get_app_version_and_location( cpe:CPE, port:port, exit_no_version:TRUE ) ) exit( 0 );
vers = info['version'];
path = info['location'];
if( ereg( pattern:"^(1\.|2\.|3\.(0|1|2|2\.[1-4]))$", string:vers ) ) {
report = report_fixed_ver( installed_version:vers, fixed_version:"3.2.5", install_path:path );
security_message( port:port, data:report );
}
exit( 0 );
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo