Lucene search

K

Horde Gollem < 3.0.13 XSS Vulnerability - Linux

🗓️ 28 May 2020 00:00:00Reported by Copyright (C) 2020 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 49 Views

Horde Gollem < 3.0.13 XSS Vulnerability - Linux. Prone to cross-site scripting via HTTP GET dir parameter, affects breadcrumb outpu

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
Cvelist
CVE-2020-8034
18 May 202016:07
cvelist
Prion
Cross site scripting
18 May 202017:15
prion
OSV
DLA-2229-1 php-horde-gollem - security update
31 May 202000:00
osv
OSV
CVE-2020-8034
18 May 202017:15
osv
Debian CVE
CVE-2020-8034
18 May 202017:15
debiancve
OpenVAS
Horde Gollem < 3.0.13 XSS Vulnerability - Windows
28 May 202000:00
openvas
OpenVAS
Debian: Security Advisory (DLA-2229-1)
1 Jun 202000:00
openvas
Tenable Nessus
Debian DLA-2229-1 : php-horde-gollem security update
1 Jun 202000:00
nessus
CVE
CVE-2020-8034
18 May 202017:15
cve
Debian
[SECURITY] [DLA 2229-1] php-horde-gollem security update
31 May 202014:51
debian
Rows per page
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:horde:gollem";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.143996");
  script_version("2024-02-15T05:05:40+0000");
  script_tag(name:"last_modification", value:"2024-02-15 05:05:40 +0000 (Thu, 15 Feb 2024)");
  script_tag(name:"creation_date", value:"2020-05-28 03:11:47 +0000 (Thu, 28 May 2020)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2020-05-31 18:15:00 +0000 (Sun, 31 May 2020)");

  script_cve_id("CVE-2020-8034");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Horde Gollem < 3.0.13 XSS Vulnerability - Linux");

  script_copyright("Copyright (C) 2020 Greenbone AG");
  script_category(ACT_GATHER_INFO);
  script_family("Web application abuses");
  script_dependencies("gb_horde_gollem_detect.nasl", "os_detection.nasl");
  script_mandatory_keys("horde/gollem/installed", "Host/runs_unixoide");

  script_tag(name:"summary", value:"Horde Gollem is prone to a cross-site scripting vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"insight", value:"Gollem is affected by a reflected cross-site scripting (XSS) vulnerability
  via the HTTP GET dir parameter in the browser functionality, affecting breadcrumb output.");

  script_tag(name:"impact", value:"An attacker can obtain access to a victim's webmail account by making them
  visit a malicious URL.");

  script_tag(name:"affected", value:"Horde Gollem prior to version 3.0.13.");

  script_tag(name:"solution", value:"Update to version 3.0.13 or later.");

  script_xref(name:"URL", value:"https://lists.horde.org/archives/announce/2020/001289.html");

  exit(0);
}

include("version_func.inc");
include("host_details.inc");

if (!port = get_app_port(cpe: CPE))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_is_less(version: version, test_version: "3.0.13")) {
  report = report_fixed_ver(installed_version: version, fixed_version:"3.0.13", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 May 2020 00:00Current
6Medium risk
Vulners AI Score6
CVSS24.3
CVSS36.1
EPSS0.00499
49
.json
Report