Vulnerability Name: CVE-2005-4190 (CCN-23620) Assigned: 2005-12-11 Published: 2005-12-11 Updated: 2011-09-13 Summary: Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework before 3.0.8 allow remote authenticated users to inject arbitrary web script or HTML via multiple vectors, as demonstrated by (1) the identity field, (2) Category and (3) Label search fields, (4) the Mobile Phone field, and (5) Date and (6) Time fields when importing CSV files, as exploited through modules such as (a) Turba Address Book, (b) Kronolith, (c) Mnemo, and (d) Nag. CVSS v3 Severity: 2.6 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:L/UI:R/S:U/C:N/I:L/A:N )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): LowUser Interaction (UI): RequiredScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): LowAvailibility (A): None
CVSS v2 Severity: 3.5 Low (CVSS v2 Vector: AV:N/AC:M/Au:S/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): MediumAuthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
2.1 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:S/C:N/I:P/A:N )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): Single_InstanceImpact Metrics: Confidentiality (C): NoneIntegrity (I): PartialAvailibility (A): None
Vulnerability Type: CWE-79 Vulnerability Consequences: Gain Access References: Source: CCN Type: Full-Disclosure Mailing List, Sun Dec 11 2005 - 14:04:30 CSTSEC Consult SA-20051211-0 :: Several XSS issues in Horde Framework, Kronolith Calendar, Mnemo Notes, Nag Tasks and Turba Addressbook Source: MITRE Type: CNACVE-2005-4190 Source: MITRE Type: CNACVE-2005-4192 Source: MLIST Type: Patch[horde-announce] 20051211 Horde 3.0.8 (final) Source: CCN Type: SA17964Mnemo Script Insertion Vulnerabilities Source: CCN Type: SA17970Horde Script Insertion Vulnerabilities Source: SECUNIA Type: Patch, Vendor Advisory17970 Source: SECUNIA Type: Vendor Advisory19619 Source: SECUNIA Type: Vendor Advisory19897 Source: SECUNIA Type: Vendor Advisory20960 Source: DEBIAN Type: UNKNOWNDSA-1033 Source: DEBIAN Type: DSA-1033horde3 -- several vulnerabilities Source: CCN Type: Mnemo Web siteMnemo Source: SUSE Type: UNKNOWNSUSE-SR:2006:009 Source: SUSE Type: UNKNOWNSUSE-SR:2006:016 Source: CCN Type: OSVDB ID: 21604Horde Mnemo Application Notepad Multiple Field XSS Source: CCN Type: OSVDB ID: 21606Horde Framework Multiple Field XSS Source: CCN Type: OSVDB ID: 21607Horde Framework CSV Import Multiple Field Arbitrary Script Execution Source: MISC Type: UNKNOWNhttp://www.sec-consult.com/245.html Source: BID Type: UNKNOWN15802 Source: CCN Type: BID-15802Horde Turba Multiple HTML Injection Vulnerabilities Source: BID Type: UNKNOWN15803 Source: CCN Type: BID-15803Horde Mnemo Remote HTML Injection Vulnerabilities Source: BID Type: UNKNOWN15804 Source: CCN Type: BID-15804Horde Nag Remote HTML Injection Vulnerabilities Source: BID Type: UNKNOWN15806 Source: CCN Type: BID-15806Horde Application Framework Input Validation Vulnerabilities Source: BID Type: UNKNOWN15808 Source: CCN Type: BID-15808Horde Kronolith Multiple HTML Injection Vulnerabilities Source: BID Type: UNKNOWN15810 Source: CCN Type: BID-15810Horde Application Framework CSV File Upload Code Execution Vulnerability Source: VUPEN Type: Vendor AdvisoryADV-2005-2835 Source: XF Type: UNKNOWNmnemo-notepad-xss(23620) Source: SUSE Type: SUSE-SR:2006:009SUSE Security Summary Report Source: SUSE Type: SUSE-SR:2006:016SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:horde:horde_application_framework:1.0.0:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.2:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.2_1:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.3_2:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.3_3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.3_4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.5:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.6:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.8:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.9:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.10:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.0.11:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.0:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.1:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.2:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.5:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.6:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.7:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.2.8:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.3.3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:1.3.4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.0:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.1:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.1:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.5:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.6:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.7:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.8:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:2.2.9:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.1:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.2:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.3:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.5:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.6:*:*:*:*:*:*:* OR cpe:/a:horde:horde_application_framework:3.0.7:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
horde horde application framework 1.0.0
horde horde application framework 1.0.2
horde horde application framework 1.0.2_1
horde horde application framework 1.0.3
horde horde application framework 1.0.3_2
horde horde application framework 1.0.3_3
horde horde application framework 1.0.3_4
horde horde application framework 1.0.4
horde horde application framework 1.0.5
horde horde application framework 1.0.6
horde horde application framework 1.0.8
horde horde application framework 1.0.9
horde horde application framework 1.0.10
horde horde application framework 1.0.11
horde horde application framework 1.2.0
horde horde application framework 1.2.1
horde horde application framework 1.2.2
horde horde application framework 1.2.3
horde horde application framework 1.2.4
horde horde application framework 1.2.5
horde horde application framework 1.2.6
horde horde application framework 1.2.7
horde horde application framework 1.2.8
horde horde application framework 1.3.3
horde horde application framework 1.3.4
horde horde application framework 2.0
horde horde application framework 2.1
horde horde application framework 2.2
horde horde application framework 2.2.1
horde horde application framework 2.2.3
horde horde application framework 2.2.4
horde horde application framework 2.2.5
horde horde application framework 2.2.6
horde horde application framework 2.2.7
horde horde application framework 2.2.8
horde horde application framework 2.2.9
horde horde application framework 3.0.1
horde horde application framework 3.0.2
horde horde application framework 3.0.3
horde horde application framework 3.0.4
horde horde application framework 3.0.5
horde horde application framework 3.0.6
horde horde application framework 3.0.7