In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.
The product does not neutralize or incorrectly neutralizes user-controllable input before it is placed in output that is used as a web page that is served to other users.
Link | Tags |
---|---|
http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html | issue tracking exploit third party advisory |
https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716 | patch vendor advisory |
https://lists.debian.org/debian-lts-announce/2020/08/msg00048.html | mailing list |