First published: Sun Feb 14 2021(Updated: )
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware Webmail Edition | <=5.2.22 | |
Debian GNU/Linux | =9.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this XSS issue in Horde Groupware Webmail Edition is CVE-2021-26929.
The severity of CVE-2021-26929 is medium (score of 6.1).
The affected software version of Horde Groupware Webmail Edition is up to and including 5.2.22.
The Common Weakness Enumeration (CWE) ID associated with this vulnerability is CWE-79.
To fix the XSS issue in Horde Groupware Webmail Edition, update to a version later than 5.2.22 and ensure that the Horde_Text_Filter library is at least version 2.3.7.