First published: Mon May 18 2020(Updated: )
Gollem before 3.0.13, as used in Horde Groupware Webmail Edition 5.2.22 and other products, is affected by a reflected Cross-Site Scripting (XSS) vulnerability via the HTTP GET dir parameter in the browser functionality, affecting breadcrumb output. An attacker can obtain access to a victim's webmail account by making them visit a malicious URL.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Gollem | <3.0.13 | |
Horde Groupware | =5.2.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2020-8034.
The severity of CVE-2020-8034 is medium.
Gollem before version 3.0.13 and Horde Groupware Webmail Edition 5.2.22 are affected by this vulnerability.
The CWE ID of CVE-2020-8034 is CWE-79.
To fix CVE-2020-8034, you should update to version 3.0.13 or higher of Gollem and version 5.2.23 or higher of Horde Groupware Webmail Edition.