Lucene search

K

Horde < 2.2.7 Help Subsystem XSS Vulnerability - Active Check

🗓️ 03 Nov 2005 00:00:00Reported by Copyright (C) 2004 George A. TheallType 
openvas
 openvas
🔗 plugins.openvas.org👁 10 Views

The target is running at least one instance of Horde in which the help subsystem is vulnerable to a cross site scripting attack since information passed to the help window is not properly sanitized

Show more

AI Insights are available for you today

Leverage the power of AI to quickly understand vulnerabilities, impacts, and exploitability

Related
Refs
Code
ReporterTitlePublishedViews
Family
OpenVAS
FreeBSD Ports: horde, horde-devel
4 Sep 200800:00
openvas
OpenVAS
FreeBSD Ports: horde, horde-devel
4 Sep 200800:00
openvas
Cvelist
CVE-2004-2741
9 Oct 200710:00
cvelist
NVD
CVE-2004-2741
31 Dec 200405:00
nvd
CVE
CVE-2004-2741
9 Oct 200710:00
cve
Tenable Nessus
Horde Application Framework Help Window Multiple Parameter XSS
2 Nov 200400:00
nessus
SourceLink
securityfocuswww.securityfocus.com/bid/11546
# SPDX-FileCopyrightText: 2004 George A. Theall
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:horde:horde_groupware";

if(description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.15605");
  script_version("2025-03-27T05:38:50+0000");
  script_tag(name:"last_modification", value:"2025-03-27 05:38:50 +0000 (Thu, 27 Mar 2025)");
  script_tag(name:"creation_date", value:"2005-11-03 14:08:04 +0100 (Thu, 03 Nov 2005)");
  script_tag(name:"cvss_base", value:"4.3");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:N/I:P/A:N");

  script_cve_id("CVE-2004-2741");

  script_tag(name:"qod_type", value:"remote_analysis");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Horde < 2.2.7 Help Subsystem XSS Vulnerability - Active Check");

  script_category(ACT_ATTACK);

  script_copyright("Copyright (C) 2004 George A. Theall");
  script_family("Web application abuses");
  script_dependencies("horde_http_detect.nasl");
  script_mandatory_keys("horde/http/detected");
  script_require_ports("Services/www", 443);

  script_tag(name:"summary", value:"Horde is prone to a cross-site scripting (XSS)
  vulnerability.");

  script_tag(name:"vuldetect", value:"Sends a crafted HTTP GET request and checks the response.");

  script_tag(name:"insight", value:"The help subsystem is vulnerable to a cross-site scripting
  attack since information passed to the help window is not properly sanitized.");

  script_tag(name:"solution", value:"Update to version 2.2.7 or later.");

  script_xref(name:"URL", value:"http://www.securityfocus.com/bid/11546");
  script_xref(name:"OSVDB", value:"11164");

  exit(0);
}

include("http_func.inc");
include("http_keepalive.inc");
include("host_details.inc");

if( ! port = get_app_port( cpe:CPE, service:"www" ) )
  exit( 0 );

if( ! dir = get_app_location( cpe:CPE, port:port ) )
  exit( 0 );

if( dir == "/" )
  dir = "";

# nb: if you change the URL, you probably need to change the pattern in the egrep() below.
url = dir + "/help.php?show=index&module=vttest%22%3E%3Cframe%20src=%22javascript:alert(42)%22%20";

if( http_vuln_check( port:port, url:url, pattern:'frame src="javascript:alert', check_header:TRUE ) ) {
  report = http_report_vuln_url( port:port, url:url );
  security_message( port:port, data:report );
  exit( 0 );
}

exit( 99 );

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
03 Nov 2005 00:00Current
5.9Medium risk
Vulners AI Score5.9
CVSS24.3
EPSS0.00475
10
.json
Report