Summary
Horde IMP Webmail is prone to an HTML-injection vulnerability because it fails to sufficiently sanitize user-supplied data before it is used in dynamic content.
Attacker-supplied HTML or JavaScript code could run in the context of the affected site, potentially allowing the attacker to steal cookie- based authentication credentials and to control how the site is rendered to the user
other attacks are also possible.
Horde IMP 4.3.7 is affected
other versions may also be vulnerable.
Solution
Updates are available. Please see the references for more information.
References
Severity
Classification
-
CVE CVE-2010-3695, CVE-2010-4778 -
CVSS Base Score: 4.3
AV:N/AC:M/Au:N/C:N/I:P/A:N
Related Vulnerabilities
- Apache Tomcat 'sendfile' Request Attributes Information Disclosure Vulnerability
- Aardvark Topsites <= 4.2.2 Remote File Inclusion Vulnerability
- AMSI 'file' Parameter Directory Traversal Vulnerability
- Aker Secure Mail Gateway Cross-Site Scripting Vulnerability
- @Mail WebMail Email Body HTML Injection Vulnerability