Vulnerability Name:

CVE-2009-3237 (CCN-53200)

Assigned:2009-09-14
Published:2009-09-14
Updated:2019-06-18
Summary:Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; allow remote attackers to inject arbitrary web script or HTML via the (1) crafted number preferences that are not properly handled in the preference system (services/prefs.php), as demonstrated by the sidebar_width parameter; or (2) crafted unknown MIME "text parts" that are not properly handled in the MIME viewer library (config/mime_drivers.php).
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.7 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-79
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: UNKNOWN
http://bugs.horde.org/ticket/?id=8311

Source: CONFIRM
Type: UNKNOWN
http://bugs.horde.org/ticket/?id=8399

Source: MITRE
Type: CNA
CVE-2009-3237

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] [SECURITY] Horde 3.2.5 (final)

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] Horde Groupware 1.1.6 (final)

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.1.6 (final)

Source: CCN
Type: Horde [announce] Mailing List, 2009-09-14 10:16:12
[announce] [SECURITY] Horde 3.3.5 (final)

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] [SECURITY] Horde 3.3.5 (final)

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] Horde Groupware 1.2.4 (final)

Source: MLIST
Type: Patch
[horde-announce] 20090914 [announce] Horde Groupware Webmail Edition 1.2.4 (final)

Source: CCN
Type: SA36665
Horde Application Framework Multiple Vulnerabilities

Source: SECUNIA
Type: Vendor Advisory
36665

Source: CCN
Type: SA36729
Horde Groupware / Groupware Webmail Edition Multiple Vulnerabilities

Source: DEBIAN
Type: DSA-1966
horde3 -- insufficient input sanitising

Source: CCN
Type: Horde Application Framework Web site
The Horde Project

Source: CCN
Type: The Horde Project Web site
Horde- Create. Communicate. Collaborate

Source: CCN
Type: Horde Web site
Horde Groupware Webmail Edition

Source: OSVDB
Type: UNKNOWN
58108

Source: OSVDB
Type: UNKNOWN
58109

Source: CCN
Type: OSVDB ID: 58108
Horde Application Framework MIME Viewer Text Part Rendering XSS

Source: CCN
Type: OSVDB ID: 58109
Horde Application Framework Numeric Preference Type XSS

Source: CCN
Type: BID-36382
Multiple Horde Products Cross-Site Scripting Vulnerabilities and File Overwrite Vulnerability

Source: XF
Type: UNKNOWN
horde-mimeviewer-xss(53200)

Source: XF
Type: UNKNOWN
horde-mimeviewer-xss(53200)

Source: SUSE
Type: SUSE-SR:2010:004
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:horde:horde_application_framework:3.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_groupware:1.2.3:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/a:horde:groupware:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1:rc1:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1:rc2:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1:rc3:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1:rc4:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2:rc1:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:horde:groupware:1.2.3:rc1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:horde:horde_groupware:1.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:horde:horde_application_framework:3.3.4:*:*:*:*:*:*:*
  • AND
  • cpe:/o:debian:debian_linux:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:5.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20093237
    V
    CVE-2009-3237
    2015-11-16
    oval:org.mitre.oval:def:12635
    P
    DSA-1966-1 horde3 -- insufficient input sanitising
    2014-07-21
    oval:org.mitre.oval:def:7069
    P
    DSA-1966 horde3 -- insufficient input sanitising
    2014-06-23
    oval:org.debian:def:1966
    V
    insufficient input sanitising
    2010-01-07
    BACK
    horde horde application framework 3.2
    horde horde application framework 3.2.1
    horde horde application framework 3.2.2
    horde horde application framework 3.2.3
    horde horde application framework 3.2.4
    horde horde application framework 3.3
    horde horde application framework 3.3.1
    horde horde application framework 3.3.2
    horde horde application framework 3.3.3
    horde horde application framework 3.3.4
    horde horde groupware 1.1.1
    horde horde groupware 1.1.2
    horde horde groupware 1.1.3
    horde horde groupware 1.1.4
    horde horde groupware 1.1.5
    horde horde groupware 1.2
    horde horde groupware 1.2.1
    horde horde groupware 1.2.2
    horde horde groupware 1.2.3
    horde groupware 1.1
    horde groupware 1.1 rc1
    horde groupware 1.1 rc2
    horde groupware 1.1 rc3
    horde groupware 1.1 rc4
    horde groupware 1.1.1
    horde groupware 1.1.2
    horde groupware 1.1.3
    horde groupware 1.1.4
    horde groupware 1.1.6
    horde groupware 1.2
    horde groupware 1.2 rc1
    horde groupware 1.2.1
    horde groupware 1.2.2
    horde groupware 1.2.3
    horde groupware 1.2.3 rc1
    horde horde groupware 1.1.5
    horde horde application framework 3.2.4
    horde horde application framework 3.3.4
    debian debian linux 4.0
    debian debian linux 5.0