Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email firstname.lastname@example.org
From: Moritz Naumann (securitymoritz-naumann.com)
Date: Mon Sep 06 2010 - 11:31:13 CDT
Horde Application Framework v3.3.8 and lower are subject to a cross site
scripting (XSS) vulnerability.
The icon_browser.php script fails to properly sanitize user supplied
input to the 'subdir' URL parameter before printing it out as part of a
HTML formatted error message.
The following URL can be used as a proof of concept:
> [path_to_horde]/util/icon_browser.php?subdir=<body onload="alert('XSS')">&app=horde
Prior authentication is not required for exploitation.
This vulnerability was reported to the Horde Project on 19.05.2010 and
fixed by Michael M. Slusarz in the frameworks' GIT repository within a week:
Hoping to see an upcoming fixed release (which did not take place)
I have delayed publication - admittedly too much.
Credits for this discovery:
Naumann IT Security Consulting, Berlin, Germany
Full-Disclosure - We believe in it.
Hosted and sponsored by Secunia - http://secunia.com/