First published: Thu Jul 13 2006(Updated: )
services/go.php in Horde Application Framework 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1 does not properly restrict its image proxy capability, which allows remote attackers to perform "Web tunneling" attacks and use the server as a proxy via (1) http, (2) https, and (3) ftp URL in the url parameter, which is requested from the server.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde application framework | =3.0.0 | |
Horde application framework | =3.0.1 | |
Horde application framework | =3.0.2 | |
Horde application framework | =3.0.3 | |
Horde application framework | =3.0.4 | |
Horde application framework | =3.0.5 | |
Horde application framework | =3.0.6 | |
Horde application framework | =3.0.7 | |
Horde application framework | =3.0.8 | |
Horde application framework | =3.0.9 | |
Horde application framework | =3.0.10 | |
Horde application framework | =3.1.0 | |
Horde application framework | =3.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3549 is considered a high severity vulnerability due to its ability to allow remote attackers to exploit the image proxy of the Horde Application Framework.
To fix CVE-2006-3549, you should upgrade to Horde Application Framework version 3.1.2 or later, which addresses this vulnerability.
CVE-2006-3549 affects Horde Application Framework versions 3.0.0 through 3.0.10 and 3.1.0 through 3.1.1.
CVE-2006-3549 enables remote attackers to perform 'Web tunneling' attacks, effectively using the server as a proxy.
Yes, CVE-2006-3549 is remotely exploitable, allowing attackers to manipulate the image proxy feature from outside the local network.