First published: Thu Sep 17 2009(Updated: )
The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware | =1.1 | |
Horde Application Framework | =3.2.4 | |
Horde Groupware | =1.2.2 | |
Horde Groupware | =1.1.5 | |
Horde Application Framework | =3.2.1 | |
Horde Application Framework | =3.3.2 | |
Horde Groupware | =1.2.1 | |
Horde Application Framework | =3.2.2 | |
Horde Groupware | =1.1.1 | |
Horde Application Framework | =3.3.3 | |
Horde Groupware | =1.1.3 | |
Horde Application Framework | =3.3.4 | |
Horde Application Framework | =3.2.3 | |
Horde Application Framework | =3.3.1 | |
Horde Application Framework | =3.2 | |
Horde Groupware | =1.2-rc1 | |
Horde Groupware | =1.2 | |
Horde Groupware | =1.1.4 | |
Horde Application Framework | =3.3 | |
Horde Groupware | =1.1.2 | |
Horde Groupware | =1.2.3 | |
Horde Groupware | =1.1-rc1 | |
Horde Groupware | =1.1-rc2 | |
Horde Groupware | =1.1-rc3 | |
Horde Groupware | =1.1-rc4 | |
Horde Groupware | =1.2.3-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.