exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

hordeXSS-2.txt

hordeXSS-2.txt
Posted Aug 27, 2006
Authored by Marc Ruef | Site scip.ch

The Horde Framework and Horde IMP systems are susceptible to cross site scripting attacks in search.php. Flaws are verified in Horde versions 3.0.4 through 3.1.2 and IMP versions prior to 4.1.3.

tags | advisory, php, xss
SHA-256 | 26c3ceb148d5508570a99beb7063062a83fe03cece6d91d209c274554ed67c30

hordeXSS-2.txt

Change Mirror Download
Horde Framework and Horde IMP search.php cross site scripting

scip AG Vulnerability ID 2457 (08/16/2006)
http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457

I. INTRODUCTION

Horde is an open-source web application framework based on PHP. It
offers popular applications, such as the Horde IMP mail client, a
groupware and wiki solution.

More information is available on the official Horde product web site at
the following URL:

http://www.horde.org/

II. DESCRIPTION

Marc Ruef found several web-based vulnerabilities that were identified
in Horde 3.0.4 and verified for all versions prior to 3.1.2 and IMP
prior to 4.1.3.

On IMP search screen, some of the given fields are vulnerable to a cross
site scripting attack:

<i>Virtual folder label:</i>&nbsp;<input type="text" id="vfolder_label"
name="vfolder_label" value=""><script>alert('scipAG');</script>" />

An attacker might be able to inject script code. However, it is
important so see that this vulnerability is exploitable only with HTTP
POST requests. If the attacker has an account on the local machine, they
can create a shared folder that the victim has access to with a
malicious name.

III. EXPLOITATION

Classic script injection techniques within a browser session can be used
to exploit this vulnerabilities. [1, 2]

A plugin for our open-source exploiting framework "Attack Tool Kit"
(ATK) will be published in the near future. [3]

IV. IMPACT

Because non-authenticated parts of the software are affected too, this
vulnerabilities are serious for every secure environment.
Non-authenticated users might be able to exploit this flaw to gain
elevated privileges (e.g. extracting sensitive cookie information or
launch a buffer overflow attack against another web browser).

The other parts are affecting authenticated parts. This requires a
legitimate user to exploit the vulnerabilities. However, because cross
site scripting attacks could be launched from external attackers, these
vulnerabilities still become a high risk rating.

V. DETECTION

Detection of web based attacks requires a specialized web proxy and/or
intrusion detection system. Patterns for such a detection are available
and easy to implement.

VI. SOLUTION

The cross site scripting vulnerability (4) has been fixed in CVS HEAD
(Juli 2006) and FRAMEWORK_3. The other vulnerabilities were addressed in
the current release 3.1.2 and IMP 4.1.3.

VII. VENDOR RESPONSE

The Horde team has been informed at 07/04/2006 via email to
security-at-horde.org. A first response came back on the same day.
Several email messages were exchanged to discuss the vulnerabilities and
to co-ordinate the disclosure of this advisory.

VIII. SOURCES

scip AG - Security Consulting Information Process (german)
http://www.scip.ch

scip AG Vulnerability Database (german)
http://www.scip.ch/cgi-bin/smss/showadvf.pl?id=2457

computec.ch document data base (german)
http://www.computec.ch/download.php

IX. DISCLOSURE TIMELINE

05/15/06 Identification of the vulnerabilities
07/04/06 Informing the Horde team
07/04/06 First reply of the Horde team
08/16/06 Public advisory

IX. CREDITS

The vulnerabilities were discovered by Marc Ruef.

Marc Ruef, scip AG, Zuerich, Switzerland
maru-at-scip.ch
http://www.scip.ch

A1. BIBLIOGRAPHY

[1] http://www.computec.ch/download.php?view.812
[2] http://www.computec.ch/download.php?view.808
[3] http://www.computec.ch/projekte/atk/

A2. LEGAL NOTICES

Copyright (c) 2006 scip AG, Switzerland.

Permission is granted for the re-distribution of this alert. It may not
be edited in any way without permission of scip AG.

The information in the advisory is believed to be accurate at the time
of publishing based on currently available information. There are no
warranties with regard to this information. Neither the author nor the
publisher accepts any liability for any direct, indirect or
consequential loss or damage from use of or reliance on this advisory.


Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    14 Files
  • 12
    Nov 12th
    20 Files
  • 13
    Nov 13th
    63 Files
  • 14
    Nov 14th
    18 Files
  • 15
    Nov 15th
    8 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    18 Files
  • 19
    Nov 19th
    7 Files
  • 20
    Nov 20th
    13 Files
  • 21
    Nov 21st
    6 Files
  • 22
    Nov 22nd
    48 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    60 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    44 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close