First published: Thu Jun 19 2008(Updated: )
Multiple cross-site scripting (XSS) vulnerabilities in Horde Groupware, Groupware Webmail Edition, and Kronolith allow remote attackers to inject arbitrary web script or HTML via the timestamp parameter to (1) week.php, (2) workweek.php, and (3) day.php; and (4) the horde parameter in the PATH_INFO to the default URI. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware Webmail Edition | ||
Horde Groupware | ||
Horde Kronolith H3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2783 is classified as a medium severity vulnerability due to its potential for cross-site scripting attacks.
To fix CVE-2008-2783, update the Horde Groupware, Groupware Webmail Edition, or Kronolith to the latest version that mitigates these XSS vulnerabilities.
CVE-2008-2783 affects several Horde applications including Horde Groupware, Groupware Webmail Edition, and Kronolith.
CVE-2008-2783 can be exploited to perform cross-site scripting attacks, allowing attackers to inject arbitrary web scripts or HTML.
CVE-2008-2783 involves the 'timestamp' parameter in week.php, workweek.php, day.php, and the 'horde' parameter in PATH_INFO.