漏洞信息详情
Horde Groupware Webmail 跨站脚本漏洞
漏洞简介
Horde Groupware Webmail是美国Horde公司的一套基于浏览器的企业级通信套件。
Horde Groupware Webmail Edition中存在跨站脚本漏洞,该漏洞源于WEB应用缺少对客户端数据的正确验证。攻击者可利用该漏洞执行客户端代码。
漏洞公告
目前厂商暂未发布修复措施解决此安全问题,建议使用此软件的用户随时关注厂商主页或参考网址以获取解决办法:
https://www.horde.org/apps/webmail
参考网址
来源:MLIST
链接:https://lists.debian.org/debian-lts-announce/2021/02/msg00028.html
来源:CONFIRM
链接:https://lists.horde.org/archives/announce/2021/001298.html
来源:MISC
链接:https://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html
来源:MISC
链接:https://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html
来源:MISC
链接:https://www.alexbirnberg.com/horde-xss.html
来源:MISC
链接:https://www.horde.org/apps/webmail
来源:MISC
链接:https://github.com/horde/webmail/releases
来源:nvd.nist.gov
链接:https://nvd.nist.gov/vuln/detail/CVE-2021-26929
来源:vigilance.fr
链接:https://vigilance.fr/vulnerability/Horde-Groupware-Webmail-Edition-Cross-Site-Scripting-via-Horde-Text-Filter-34620
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162187/Webmail-Edition-5.2.22-XSS-Remote-Code-Execution.html
来源:www.exploit-db.com
链接:https://www.exploit-db.com/exploits/49769
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2021.0645
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/162194/Horde-Groupware-Webmail-5.2.22-Cross-Site-Scripting.html
来源:cxsecurity.com
链接:https://cxsecurity.com/issue/WLB-2021040087
受影响实体
暂无
补丁
暂无
还没有评论,来说两句吧...