Vigil@nce: Horde IMP, Turba, Cross Site Scripting de test.php
December 2008 by Vigil@nce
SYNTHESIS
When the test.php script is installed, an attacker can use it to
create a Cross Site Scripting.
Gravity: 1/4
Consequences: client access/rights
Provenance: document
Means of attack: no proof of concept, no attack
Ability of attacker: expert (4/4)
Confidence: confirmed by the editor (5/5)
Diffusion of the vulnerable configuration: low (1/3)
Creation date: 10/12/2008
IMPACTED PRODUCTS
– Unix - plateform
DESCRIPTION
The test.php script is used to check the installation and the
configuration of Horde. The documentation recommends to remove it
or to change its rights when the server is to be put on production.
This script does not escape several of its parameters with
htmlspecialchars(): server, basedn, filter and user.
When the test.php script is not disabled, an attacker can
therefore use it to create a Cross Site Scripting.
CHARACTERISTICS
Identifiers: VIGILANCE-VUL-8323