Horde IMP Webmail Client and Horde Groupware Webmail Edition HTML filter security bypass
|horde-impgroupware-filter-security-bypass (39595)||Medium Risk|
The Horde IMP Webmail Client and Horde Groupware Webmail Edition could allow a remote attacker to bypass security restrictions. The HTML filter fails to perform validation checks on HTTP requests which could allow an attacker to perform unauthorized actions. By persuading a victim to open a specially-crafted HTML email, a remote attacker could exploit this vulnerability to delete arbitrary email messages or purge previously deleted email messages.
Update to Horde version 3.1.6 or Horde Groupware Webmail Edition 1.0.4, available from the Horde Web site. See References.
- Horde Web site: Version Control: Diff for horde/docs/CHANGES between version 1.515.2.306 and 1.515.2.312.2.2.
- Horde [announce] Mailing List, Wed Jan 9 22:31:37 UTC 2008: Horde 3.1.6 (final).
- Secunia Research 10/01/2008: IMP Mail Deletion Security Bypass Vulnerability .
- BID-27223: Horde IMP and Groupware Webmail Edition Multiple Input Validation Vulnerabilities
- CVE-2007-6018: IMP Webmail Client 4.1.5, Horde Application Framework 3.1.5, and Horde Groupware Webmail Edition 1.0.3 does not validate unspecified HTTP requests, which allows remote attackers to (1) delete arbitrary e-mail messages via a modified numeric ID or (2) purge deleted emails via a crafted email message.
- DSA-1470: horde3 -- missing input sanitising
- GLSA-200802-03: Horde IMP: Security bypass
- OSVDB ID: 42772: Horde / IMP Mail Crafted Numeric ID Arbitrary Mail Deletion
- OSVDB ID: 42773: Horde / IMP Mail Crafted E-mail Arbitrary Delete Mail Purge
- SA28020: IMP Mail Deletion Security Bypass Vulnerability
- SUSE-SR:2009:007: SUSE Security Summary Report
- Debian Debian Linux 4.0
- Gentoo Linux
- Horde Horde Application Framework 3.1.5
- Horde Horde Groupware Webmail Edition 1.0.3
- Horde IMP 4.1.5
Jan 09, 2008
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall the author/distributor (IBM Internet Security Systems X-Force) be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.
For corrections or additions please email ignore thisxforceignore this@ignore thisus.ignore thisibm.comignore this
* According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
The information within this database may change without notice. Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. In no event shall IBM be held liable for any damages whatsoever arising out of or in connection with the use or spread of this information.