CVSS2
Attack Vector
NETWORK
Attack Complexity
MEDIUM
Authentication
SINGLE
Confidentiality Impact
PARTIAL
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:S/C:P/I:P/A:N
AI Score
Confidence
Low
EPSS
Percentile
57.8%
lib/Driver/sql.php in Turba 2 (turba2) Contact Manager H3 2.1.x before 2.1.7 and 2.2.x before 2.2-RC3, as used in products such as Horde Groupware before 1.0.4 and Horde Groupware Webmail Edition before 1.0.5, does not properly check access rights, which allows remote authenticated users to modify address data via a modified object_id parameter to edit.php, as demonstrated by modifying a personal address book entry when there is write access to a shared address book.
Vendor | Product | Version | CPE |
---|---|---|---|
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:*:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:alpha:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:amd64:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:arm:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:hppa:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:ia-32:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:ia-64:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:m68k:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:mips:*:*:*:*:* |
debian | debian_linux | 4.0 | cpe:2.3:o:debian:debian_linux:4.0:*:mipsel:*:*:*:*:* |
bugs.debian.org/cgi-bin/bugreport.cgi?bug=464058
lists.horde.org/archives/announce/2008/000378.html
lists.horde.org/archives/announce/2008/000379.html
lists.horde.org/archives/announce/2008/000380.html
lists.horde.org/archives/announce/2008/000381.html
secunia.com/advisories/28982
secunia.com/advisories/29071
secunia.com/advisories/29184
secunia.com/advisories/29185
secunia.com/advisories/29186
www.debian.org/security/2008/dsa-1507
www.securityfocus.com/bid/27844
www.securitytracker.com/id?1019433
www.vupen.com/english/advisories/2008/0593/references
bugzilla.redhat.com/show_bug.cgi?id=432027
www.redhat.com/archives/fedora-package-announce/2008-February/msg00888.html
www.redhat.com/archives/fedora-package-announce/2008-February/msg00927.html