CVSS2
Attack Vector
NETWORK
Attack Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
85.7%
services/go.php in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 does not properly restrict its image proxy capability, which allows remote attackers to perform “Web tunneling” attacks and use the server as a proxy via (1) http, (2) https, and (3) ftp URL in the url parameter, which is requested from the server.
Vendor | Product | Version | CPE |
---|---|---|---|
horde | horde_application_framework | 3.0.0 | cpe:2.3:a:horde:horde_application_framework:3.0.0:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.1 | cpe:2.3:a:horde:horde_application_framework:3.0.1:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.2 | cpe:2.3:a:horde:horde_application_framework:3.0.2:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.3 | cpe:2.3:a:horde:horde_application_framework:3.0.3:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.4 | cpe:2.3:a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.5 | cpe:2.3:a:horde:horde_application_framework:3.0.5:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.6 | cpe:2.3:a:horde:horde_application_framework:3.0.6:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.7 | cpe:2.3:a:horde:horde_application_framework:3.0.7:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.8 | cpe:2.3:a:horde:horde_application_framework:3.0.8:*:*:*:*:*:*:* |
horde | horde_application_framework | 3.0.9 | cpe:2.3:a:horde:horde_application_framework:3.0.9:*:*:*:*:*:*:* |
lists.horde.org/archives/announce/2006/000287.html
lists.horde.org/archives/announce/2006/000288.html
moritz-naumann.com/adv/0011/hordemulti/0011.txt
secunia.com/advisories/20954
secunia.com/advisories/21459
secunia.com/advisories/27565
securityreason.com/securityalert/1229
securitytracker.com/id?1016442
www.debian.org/security/2007/dsa-1406
www.novell.com/linux/security/advisories/2006_19_sr.html
www.securityfocus.com/archive/1/439255/100/0/threaded
www.securityfocus.com/bid/18845
www.vupen.com/english/advisories/2006/2694