CVE-2008-1284
 
Severity Score
6.0
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
Vulnerabilidad de salto de directorio en Horde 3.1.6, Groupware anterior 1.0.5, y Groupware Webmail Edition anterior 1.0.6, cuando ejecuta ciertas configuraciones, pertmite a usuarios autenticados remotamente leer y ejecutar ficheros de su elección a través de secuencias ".." y de byte nulo en el mismo "theme name".
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2008-03-10 CVE Reserved
- 2008-03-11 CVE Published
- 2024-08-07 CVE Updated
- 2024-10-29 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (17)
URL | Tag | Source |
---|---|---|
http://lists.horde.org/archives/announce/2008/000383.html | Mailing List | |
http://lists.horde.org/archives/announce/2008/000384.html | Mailing List | |
http://securityreason.com/securityalert/3726 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/489239/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/489289/100/0/threaded | Mailing List | |
http://www.vupen.com/english/advisories/2008/0822/references | Vdb Entry | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://lists.horde.org/archives/announce/2008/000382.html | 2018-10-11 | |
http://www.securityfocus.com/bid/28153 | 2018-10-11 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/29286 | 2018-10-11 | |
http://secunia.com/advisories/29374 | 2018-10-11 | |
http://secunia.com/advisories/29400 | 2018-10-11 | |
http://secunia.com/advisories/30047 | 2018-10-11 | |
http://security.gentoo.org/glsa/glsa-200805-01.xml | 2018-10-11 | |
http://www.debian.org/security/2008/dsa-1519 | 2018-10-11 | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html | 2018-10-11 | |
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html | 2018-10-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Horde Search vendor "Horde" | Groupware Search vendor "Horde" for product "Groupware" | <= 1.0.4 Search vendor "Horde" for product "Groupware" and version " <= 1.0.4" | - |
Affected
| ||||||
Horde Search vendor "Horde" | Groupware Webmail Edition Search vendor "Horde" for product "Groupware Webmail Edition" | <= 1.0.5 Search vendor "Horde" for product "Groupware Webmail Edition" and version " <= 1.0.5" | - |
Affected
| ||||||
Horde Search vendor "Horde" | Horde Search vendor "Horde" for product "Horde" | 3.1.6 Search vendor "Horde" for product "Horde" and version "3.1.6" | - |
Affected
|