First published: Mon Dec 21 2009(Updated: )
Text_Filter/lib/Horde/Text/Filter/Xss.php in Horde Application Framework before 3.3.6, Horde Groupware before 1.2.5, and Horde Groupware Webmail Edition before 1.2.5 does not properly handle data: URIs, which allows remote attackers to conduct cross-site scripting (XSS) attacks via data:text/html values for the HREF attribute of an A element in an HTML e-mail message. NOTE: the vendor states that the issue is caused by "an XSS vulnerability in Firefox browsers."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Horde application framework | <=3.3.5 | |
Horde Horde application framework | =2.0 | |
Horde Horde application framework | =2.1 | |
Horde Horde application framework | =2.1.3 | |
Horde Horde application framework | =2.2 | |
Horde Horde application framework | =2.2.1 | |
Horde Horde application framework | =2.2.3 | |
Horde Horde application framework | =2.2.4 | |
Horde Horde application framework | =2.2.4_rc1 | |
Horde Horde application framework | =2.2.5 | |
Horde Horde application framework | =2.2.6 | |
Horde Horde application framework | =3.0 | |
Horde Horde application framework | =3.0.1 | |
Horde Horde application framework | =3.0.2 | |
Horde Horde application framework | =3.0.3 | |
Horde Horde application framework | =3.0.4 | |
Horde Horde application framework | =3.0.6 | |
Horde Horde application framework | =3.0.7 | |
Horde Horde application framework | =3.0.8 | |
Horde Horde application framework | =3.0.9 | |
Horde Horde application framework | =3.1 | |
Horde Horde application framework | =3.1.1 | |
Horde Horde application framework | =3.2 | |
Horde Horde application framework | =3.2.1 | |
Horde Horde application framework | =3.2.2 | |
Horde Horde application framework | =3.2.3 | |
Horde Horde application framework | =3.2.4 | |
Horde Horde application framework | =3.3 | |
Horde Horde application framework | =3.3.1 | |
Horde Horde application framework | =3.3.2 | |
Horde Horde application framework | =3.3.3 | |
Horde Horde application framework | =3.3.4 | |
Horde Groupware Webmail Edition | <=1.2.4 | |
Horde Groupware Webmail Edition | =1.0 | |
Horde Groupware Webmail Edition | =1.0.1 | |
Horde Groupware Webmail Edition | =1.0.2 | |
Horde Groupware Webmail Edition | =1.0.3 | |
Horde Groupware Webmail Edition | =1.0.4 | |
Horde Groupware Webmail Edition | =1.0.5 | |
Horde Groupware Webmail Edition | =1.1 | |
Horde Groupware Webmail Edition | =1.1.1 | |
Horde Groupware Webmail Edition | =1.1.2 | |
Horde Groupware Webmail Edition | =1.1.3 | |
Horde Groupware Webmail Edition | =1.1.4 | |
Horde Groupware Webmail Edition | =1.1.5 | |
Horde Groupware Webmail Edition | =1.2 | |
Horde Groupware Webmail Edition | =1.2-rc1 | |
Horde Groupware Webmail Edition | =1.2.1 | |
Horde Groupware Webmail Edition | =1.2.2 | |
Horde Groupware Webmail Edition | =1.2.3 | |
Horde Groupware Webmail Edition | =1.0-rc1 | |
Horde Groupware Webmail Edition | =1.0-rc2 | |
Horde Groupware Webmail Edition | =1.0.6 | |
Horde Groupware Webmail Edition | =1.0.7 | |
Horde Groupware Webmail Edition | =1.0.8 | |
Horde Groupware Webmail Edition | =1.1-rc1 | |
Horde Groupware Webmail Edition | =1.1-rc2 | |
Horde Groupware Webmail Edition | =1.1-rc3 | |
Horde Groupware Webmail Edition | =1.1-rc4 | |
Horde Groupware Webmail Edition | =1.1.6 | |
Horde Groupware Webmail Edition | =1.2.3-rc1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-4363 has a high severity rating as it allows remote attackers to perform cross-site scripting attacks.
To fix CVE-2009-4363, upgrade the Horde Application Framework to version 3.3.6 or later, or Horde Groupware to version 1.2.5 or later.
CVE-2009-4363 affects multiple versions of the Horde Application Framework and Horde Groupware up to specified versions.
CVE-2009-4363 allows remote attackers to exploit cross-site scripting (XSS) vulnerabilities using data: URIs.
Any remote attacker can exploit CVE-2009-4363 if they can inject malicious data: URIs into web pages served by the affected Horde applications.