blob: da27243e0255df7eadad138e5247a5e1bb22f43a [file] [log] [blame]
<?xml version="1.0" encoding="utf-8"?>
<glsa id="200802-03">
<title>Horde IMP: Security bypass</title>
Insufficient checks in Horde may allow a remote attacker to bypass security
<product type="ebuild">horde-imp</product>
<announced>February 11, 2008</announced>
<revised>February 11, 2008: 01</revised>
<package name="www-apps/horde-imp" auto="yes" arch="*">
<unaffected range="ge">4.1.6</unaffected>
<vulnerable range="lt">4.1.6</vulnerable>
Horde IMP provides a web-based access to IMAP and POP3 mailboxes.
Ulf Harnhammar, Secunia Research discovered that the "frame" and
"frameset" HTML tags are not properly filtered out. He also reported
that certain HTTP requests are executed without being checked.
<impact type="normal">
A remote attacker could entice a user to open a specially crafted HTML
e-mail, possibly resulting in the deletion of arbitrary e-mail
There is no known workaround at this time.
All Horde IMP users should upgrade to the latest version:
# emerge --sync
# emerge --ask --oneshot --verbose &quot;&gt;=www-apps/horde-imp-4.1.6&quot;</code>
<uri link="">CVE-2007-6018</uri>
<metadata tag="submitter" timestamp="Tue, 05 Feb 2008 12:56:07 +0000">
<metadata tag="bugReady" timestamp="Tue, 05 Feb 2008 12:56:20 +0000">