|
Family: CGI abuses : XSS --> Category: attack
Horde url Parameter Cross-Site Scripting Vulnerabilities Vulnerability Scan
Vulnerability Scan Summary Tries to exploit an XSS flaw in Horde's services/go.php
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote web server contains a PHP script that is affected by
multiple cross-site scripting vulnerabilities.
Description :
The version of Horde installed on the remote host fails to validate
input to the 'url' parameter of the 'services/go.php' script before
using it in dynamically generated content. An unauthenticated
attacker may be able to leverage this issue to inject arbitrary HTML
and script code into a user's browser.
In addition, similar cross-site scripting issues reportedly exist with
the 'module' parameter of the 'services/help/index.php' script and the
'name' parameter of the 'services/problem.php' script.
See also :
http://lists.grok.org.uk/pipermail/full-disclosure/2006-July/047687.html
http://lists.horde.org/archives/announce/2006/000287.html
http://lists.horde.org/archives/announce/2006/000288.html
Solution :
Upgrade to Horde 3.0.11 / 3.1.2 or later.
Threat Level:
Low / CVSS Base Score : 2.3
(AV:R/AC:L/Au:NR/C:N/I:P/A:N/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|