First published: Tue Jun 22 2010(Updated: )
The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Horde |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-1638 is considered a high severity vulnerability due to its potential to allow unauthorized access to internal networks.
To fix CVE-2010-1638, ensure that the configuration of the IMP plugin in Horde follows the product’s security recommendations.
CVE-2010-1638 facilitates a proxy-based attack that allows remote attackers to scan internal networks.
CVE-2010-1638 is found in the IMP plugin of the Horde web application framework.
CVE-2010-1638 can be exploited if the administrator does not follow recommended security guidelines during installation.