Horde IMP Email Header HTML注入漏洞

漏洞信息详情

Horde IMP Email Header HTML注入漏洞

漏洞简介

Horde IMP 3.2.3以及早期版本存在未知的漏洞。“安全修补程序,”没有正确验证输入之前,远程攻击者可以和其他用户一样通过电子邮件信息中的脚本或HTML执行任意脚本,该漏洞可能触发跨站脚本(XSS)漏洞。

漏洞公告

The vendor has released an update dealing with this issue.
Gentoo has released an advisory (GLSA 200406-11) to address this issue. Please see the referenced advisory for more information. Gentoo users may carry out the following commands to update their computers:
emerge sync
emerge -pv “>=horde-imp-3.2.4”
emerge “>=horde-imp-3.2.4”
Horde IMP 2.0

Horde IMP 2.2

Horde IMP 2.2.1

Horde IMP 2.2.2

Horde IMP 2.2.3

Horde IMP 2.2.4

Horde IMP 2.2.5

Horde IMP 2.2.6

Horde IMP 2.2.7

Horde IMP 2.2.8

Horde IMP 2.3

Horde IMP 3.0

Horde IMP 3.1

Horde IMP 3.1.2

Horde IMP 3.2

Horde IMP 3.2.1

Horde IMP 3.2.2

Horde IMP 3.2.3

参考网址

来源: XF
名称: imp-content-type-xss(16357)
链接:http://xforce.iss.net/xforce/xfdb/16357

来源: BID
名称: 10501
链接:http://www.securityfocus.com/bid/10501

来源: www.horde.org
链接:http://www.horde.org/imp/3.2/

来源: GENTOO
名称: GLSA-200406-11
链接:http://www.gentoo.org/security/en/glsa/glsa-200406-11.xml

来源: SECUNIA
名称: 11805
链接:http://secunia.com/advisories/11805

© 版权声明
THE END
喜欢就支持一下吧
点赞0 分享