First published: Wed Oct 11 2017(Updated: )
The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware Webmail Edition | =5.2.21 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-15235 is considered a medium severity vulnerability that allows remote attackers to bypass authentication.
To fix CVE-2017-15235, it is recommended to update the Horde Groupware to a patched version that addresses this vulnerability.
CVE-2017-15235 can be exploited by remote attackers who craft specific requests to download files without proper authentication.
CVE-2017-15235 affects Horde Groupware version 5.2.21 specifically.
CVE-2017-15235 can be considered relatively easy to exploit due to the requirement of a crafted 'fn' parameter.