The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
Link | Tags |
---|---|
http://www.osvdb.org/58107 | vdb entry |
http://secunia.com/advisories/36882 | third party advisory vendor advisory |
http://marc.info/?l=horde-announce&m=125294558611682&w=2 | mailing list patch |
http://secunia.com/advisories/36665 | third party advisory vendor advisory |
http://www.debian.org/security/2009/dsa-1897 | vendor advisory |
http://marc.info/?l=horde-announce&m=125292314007049&w=2 | mailing list patch |
http://marc.info/?l=horde-announce&m=125295852706029&w=2 | mailing list patch |
http://marc.info/?l=horde-announce&m=125291625030436&w=2 | mailing list patch |
http://marc.info/?l=horde-announce&m=125292339907481&w=2 | mailing list patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/53202 | vdb entry |
http://marc.info/?l=horde-announce&m=125292088004087&w=2 | mailing list patch |