4.3
CVSSv2

CVE-2009-3236

Published: 17/09/2009 Updated: 18/06/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

The form library in Horde Application Framework 3.2 prior to 3.2.5 and 3.3 prior to 3.3.5; Groupware 1.1 prior to 1.1.6 and 1.2 prior to 1.2.4; and Groupware Webmail Edition 1.1 prior to 1.1.6 and 1.2 prior to 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.

Vulnerable Product Search on Vulmon Subscribe to Product

horde application framework 3.2.3

horde application framework 3.2

horde application framework 3.3.3

horde application framework 3.3.4

horde groupware 1.1.4

horde groupware 1.1.5

horde application framework 3.2.2

horde application framework 3.2.4

horde groupware 1.1

horde groupware 1.1.1

horde groupware 1.2

horde groupware 1.2.1

horde application framework 3.3.1

horde application framework 3.3.2

horde groupware 1.2.3

horde groupware 1.1.3

horde application framework 3.2.1

horde application framework 3.3

horde groupware 1.1.2

horde groupware 1.2.2

Vendor Advisories

Stefan Esser discovered that Horde, a web application framework providing classes for dealing with preferences, compression, browser detection, connection tracking, MIME, and more, is insufficiently validating and escaping user provided input The Horde_Form_Type_image form element allows to reuse a temporary filename on reuploads which are stored ...