452 lines
16 KiB
JSON
Raw Normal View History

2023-04-24 12:24:31 +02:00
{
"id": "CVE-2005-4190",
"sourceIdentifier": "cve@mitre.org",
"published": "2005-12-13T11:03:00.000",
"lastModified": "2024-11-21T00:03:38.700",
"vulnStatus": "Modified",
"cveTags": [],
2023-04-24 12:24:31 +02:00
"descriptions": [
{
"lang": "en",
"value": "Multiple cross-site scripting (XSS) vulnerabilities in Horde Application Framework before 3.0.8 allow remote authenticated users to inject arbitrary web script or HTML via multiple vectors, as demonstrated by (1) the identity field, (2) Category and (3) Label search fields, (4) the Mobile Phone field, and (5) Date and (6) Time fields when importing CSV files, as exploited through modules such as (a) Turba Address Book, (b) Kronolith, (c) Mnemo, and (d) Nag."
},
{
"lang": "es",
"value": "M\u00faltiples vulnerabilidades de secuencias de comandos en sitios cruzados (XSS) en Horde Application Framework anteriores a 3.0.8 permiten a usuarios remotos autenticados inyectar HTML o 'script' web de su elecci\u00f3n mediante m\u00faltiples vectores, como se ha demostrado mediante (1) el campo identidad, (2) los campos de b\u00fasqueda \"Category\" y (3) \"Label\", (4) el campo \"Mobile Phone\", y (5) los campos \"Date\" y \"Time\" cuando se importa ficheros CSV, lo cual ha sido explotado mediante m\u00f3dulos como (a) Turba Address Book, (b) Kronolith, (c) Mnemo, y (d) Nag."
}
],
"metrics": {
"cvssMetricV2": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"cvssData": {
"version": "2.0",
"vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N",
"baseScore": 3.5,
2023-04-24 12:24:31 +02:00
"accessVector": "NETWORK",
"accessComplexity": "MEDIUM",
"authentication": "SINGLE",
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"availabilityImpact": "NONE"
2023-04-24 12:24:31 +02:00
},
"baseSeverity": "LOW",
"exploitabilityScore": 6.8,
"impactScore": 2.9,
"acInsufInfo": false,
"obtainAllPrivilege": false,
"obtainUserPrivilege": false,
"obtainOtherPrivilege": false,
"userInteractionRequired": false
}
]
},
"weaknesses": [
{
"source": "nvd@nist.gov",
"type": "Primary",
"description": [
{
"lang": "en",
"value": "CWE-79"
}
]
}
],
"configurations": [
{
"nodes": [
{
"operator": "OR",
"negate": false,
"cpeMatch": [
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5634E1-5D6B-4F64-99F6-5F650EC2E13B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7AF6FC53-D300-4A40-8D82-D174F6472DFD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.2_1:*:*:*:*:*:*:*",
"matchCriteriaId": "72E510AF-4FC2-4872-8844-2021CB72BEA7"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0895A4FC-4755-4125-822D-6D5A81C8EBC9"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.3_2:*:*:*:*:*:*:*",
"matchCriteriaId": "0BDEA1EC-DBD3-4255-873B-577554888E3F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.3_3:*:*:*:*:*:*:*",
"matchCriteriaId": "63D4182B-7A01-49D0-A192-4D67E64AD62F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.3_4:*:*:*:*:*:*:*",
"matchCriteriaId": "156B7704-72B9-4A19-A541-382E3362ACC3"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FAE22A26-6DF7-4EBA-8D76-24AC69B4ECD4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "166F65FA-CF60-48DB-A717-448FB84AD24C"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "8EA9E158-EF45-4468-935B-1FFA5C511874"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "50B37F3D-920B-4953-BFF3-197ADD554E82"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "3B131407-A29A-4140-A884-FADFE39CDBA8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "D6AE0227-3E50-4137-8287-45154AD6AD79"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "2A04BEC0-BFDC-4630-B98D-8924F2336EC4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "1DCEC5BC-19CD-4C86-8963-4969718AEDC1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B76253CE-3A05-40F2-9AC2-11FA1C83E12A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5DB6E8FC-E9F2-4194-B877-90ED6BCA8152"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8CE54204-8E8B-4B3D-BE10-3ECE4DBB8428"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "B159D53E-0F6D-41AA-A3D2-B77BA18735CD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "3CD03C5F-423A-475C-8D0C-4F578E93542B"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "0CF6B69C-B7E7-4EEA-A18B-2B6969F26A9E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B94258B3-CC62-41CD-987C-75868208F8C4"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "A276A013-CCF3-4AF5-973F-FD68CC9E2291"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5EB2DBC9-0934-4BA2-A6E0-CF1BCB1E0E8E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:1.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "362CDCE7-16DA-4951-81ED-5B858126E37A"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "C64FB724-0978-48E1-94AA-2ED5281C1C2F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "9535A094-9B6F-4E17-8097-D7A6D8936F8F"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7F473B48-F48A-4B6B-8D69-1F97BB6AA923"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E1A7DB-906F-4973-BF1C-EFFA0B595A42"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "DA9E6EB8-B5E5-41DF-B5E2-0A97448D16A0"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "36BEAB4E-04DA-4EDD-990C-697EA0984291"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "142B9B05-955E-4688-AF6E-ED7B4FE41846"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "295D48BB-F143-4047-B366-74101AB983CC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "58431B48-EA29-4A6F-B9FF-C416924E63B8"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "61064C18-0E45-4790-B323-262287D8DE34"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "CCFF25C4-03F2-4D65-ABA9-2406957D546E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CA0A882D-9BEB-4A3C-9371-69260374E0B6"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A17E3AFB-849F-463D-96E8-686B049F48DC"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "047563A7-5F6A-4DE2-8518-88E4E6EEB7D1"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "78356C5F-A76E-4CB1-894D-0D882A665096"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "A0405EC4-12DA-4F15-A5B0-799D399C759E"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A1C1DE26-E7B2-4A4E-9F6D-4206F7BC5EBD"
},
{
"vulnerable": true,
"criteria": "cpe:2.3:a:horde:horde_application_framework:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "6ED629B0-A214-47B5-9767-B47AFB154AFD"
}
]
}
]
}
],
"references": [
{
"url": "http://lists.horde.org/archives/announce/2005/000238.html",
"source": "cve@mitre.org",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/17970",
"source": "cve@mitre.org",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19619",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19897",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/20960",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
2023-04-24 12:24:31 +02:00
{
"url": "http://www.debian.org/security/2006/dsa-1033",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_04_28.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_16_sr.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.sec-consult.com/245.html",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15802",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15803",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15804",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15806",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15808",
"source": "cve@mitre.org"
},
{
"url": "http://www.securityfocus.com/bid/15810",
"source": "cve@mitre.org"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2835",
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://lists.horde.org/archives/announce/2005/000238.html",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
]
},
{
"url": "http://secunia.com/advisories/17970",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19619",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/19897",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://secunia.com/advisories/20960",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
},
{
"url": "http://www.debian.org/security/2006/dsa-1033",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_04_28.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.novell.com/linux/security/advisories/2006_16_sr.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.sec-consult.com/245.html",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15802",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15803",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15804",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15806",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15808",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.securityfocus.com/bid/15810",
"source": "af854a3a-2127-422b-91ae-364da2661108"
},
{
"url": "http://www.vupen.com/english/advisories/2005/2835",
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}