Name | CVE-2017-16908 |
Description | In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-2350-1 |
Debian Bugs | 909738 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
php-horde-kronolith (PTS) | jessie, jessie (lts) | 4.2.2-4+deb8u1 | fixed |
stretch (security), stretch (lts), stretch | 4.2.19-1+deb9u2 | fixed | |
buster | 4.2.25-1 | fixed | |
bullseye | 4.2.29-2 | fixed | |
sid, bookworm | 4.2.29-3 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
php-horde-kronolith | source | jessie | (not affected) | |||
php-horde-kronolith | source | stretch | 4.2.19-1+deb9u1 | DLA-2350-1 | ||
php-horde-kronolith | source | (unstable) | 4.2.24-1 | 909738 |
[jessie] - php-horde-kronolith <not-affected> (vulnerable code not present)
http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html
https://bugs.horde.org/ticket/14857
https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716