CVE-2012-0791

Multiple cross-site scripting (XSS) vulnerabilities in Horde IMP before 5.0.18 and Horde Groupware Webmail Edition before 4.0.6 allow remote attackers to inject arbitrary web script or HTML via the (1) composeCache, (2) rtemode, or (3) filename_* parameters to the compose page; (4) formname parameter to the contacts popup window; or (5) IMAP mailbox names. NOTE: some of these details are obtained from third party information.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:horde:dynamic_imp:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.0:alpha:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.0:rc3:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:horde:dynamic_imp:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.2.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:3.2.7:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:4.3.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0:alpha1:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0:beta1:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:imp:5.0.4-git:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:horde:groupware_webmail_edition:*:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.0.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc3:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1:rc4:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.1.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.3:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.4:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.5:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.6:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.7:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.8:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.9:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:1.2.10:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc1:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0:rc2:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0.1:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0.2:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0.3:*:*:*:*:*:*:*
cpe:2.3:a:horde:groupware_webmail_edition:4.0.4:*:*:*:*:*:*:*

History

21 Nov 2024, 01:35

Type Values Removed Values Added
References () http://secunia.com/advisories/47580 - Vendor Advisory () http://secunia.com/advisories/47580 - Vendor Advisory
References () http://secunia.com/advisories/47592 - Vendor Advisory () http://secunia.com/advisories/47592 - Vendor Advisory
References () http://www.debian.org/security/2012/dsa-2485 - () http://www.debian.org/security/2012/dsa-2485 -
References () http://www.horde.org/apps/imp/docs/CHANGES - () http://www.horde.org/apps/imp/docs/CHANGES -
References () http://www.horde.org/apps/imp/docs/RELEASE_NOTES - () http://www.horde.org/apps/imp/docs/RELEASE_NOTES -
References () http://www.horde.org/apps/webmail/docs/CHANGES - () http://www.horde.org/apps/webmail/docs/CHANGES -
References () http://www.horde.org/apps/webmail/docs/RELEASE_NOTES - () http://www.horde.org/apps/webmail/docs/RELEASE_NOTES -
References () http://www.openwall.com/lists/oss-security/2012/01/22/2 - () http://www.openwall.com/lists/oss-security/2012/01/22/2 -
References () http://www.securityfocus.com/bid/51586 - () http://www.securityfocus.com/bid/51586 -
References () http://www.securitytracker.com/id?1026553 - () http://www.securitytracker.com/id?1026553 -
References () http://www.securitytracker.com/id?1026554 - () http://www.securitytracker.com/id?1026554 -

Information

Published : 2012-01-24 18:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-0791

Mitre link : CVE-2012-0791

CVE.ORG link : CVE-2012-0791


JSON object : View

Products Affected

horde

  • groupware_webmail_edition
  • dynamic_imp
  • imp
CWE
CWE-79

Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')