CVE-2005-4189
CVSS3.5
发布时间 :2005-12-13 06:03:00
修订时间 :2011-03-07 21:27:48
NMCOS    

[原文]Multiple cross-site scripting (XSS) vulnerabilities in Horde Kronolith H3 before 2.0.6 allow remote authenticated users to inject arbitrary web script or HTML via (1) the Calendar name field when creating calendars, (2) event title field when deleting events, the (3) Category and (4) Location search fields, and the (5) attendees email address fields when editing event attendees, and possibly other vectors.


[CNNVD]Horde Kronolith多个HTML注入漏洞(CNNVD-200512-239)

        Kronolith是Horde日历应用程序,提供了基于Web的日历,由SQL数据库或MCAL库支持。
        Kronolith中存在多个HTML注入漏洞,如下:
        1) 认证用户可以在名称字段中("Calendar Name")以任意Javascript代码在"My Calendars"目录下创建日历,并将权限更改为系统所有用户都可以访问。如果受害用户点击了"My Calendars"菜单浏览自己的日历,就会出现所有公共的日历,并执行攻击者的脚本代码。
        2) 在删除事件时没有正确的验证日历事件的标题字段。Kronolith请求"Delete $title"并未经确认页面的进一步验证便生成$title。在使用共享/公共日历时,用户可以读取和删除其他用户的日历事件。
        3) 基本和高级搜索功能未经过滤便生成类和位置字段。攻击者可以公开某一事件并在标题或其他字段中插入常见的搜索字和恶意代码。如果受害用户搜索了该搜索字的话,就会执行插入的脚本代码。
        4) 攻击者可以在事件中加入脚本代码做为参加者的邮件地址。由于没有过滤邮件地址,浏览事件就可以导致执行任意代码。
        5) 用于编辑日历权限的弹出窗口没有过滤日历的标题,可能导致远程执行代码。

- CVSS (基础分值)

CVSS分值: 3.5 [轻微(LOW)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: MEDIUM [漏洞利用存在一定的访问条件]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

cpe:/a:horde:kronolith_h3:2.0.4_rc1
cpe:/a:horde:kronolith_h3:2.0.1
cpe:/a:horde:kronolith_h3:2.0_rc2
cpe:/a:horde:kronolith_h3:2.0.3
cpe:/a:horde:kronolith_h3:2.0_rc1
cpe:/a:horde:kronolith_h3:2.0.5
cpe:/a:horde:kronolith_h3:2.0.3_rc1
cpe:/a:horde:kronolith_h3:2.0.2_rc1
cpe:/a:horde:kronolith_h3:2.0
cpe:/a:horde:kronolith_h3:2.0_beta
cpe:/a:horde:kronolith_h3:2.0_alpha
cpe:/a:horde:kronolith_h3:2.0.4
cpe:/a:horde:kronolith_h3:2.0.2
cpe:/a:horde:kronolith_h3:2.0_rc3

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-4189
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-4189
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200512-239
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/15808
(PATCH)  BID  15808
http://www.osvdb.org/21611
(PATCH)  OSVDB  21611
http://www.osvdb.org/21610
(PATCH)  OSVDB  21610
http://www.osvdb.org/21609
(PATCH)  OSVDB  21609
http://www.osvdb.org/21608
(PATCH)  OSVDB  21608
http://secunia.com/advisories/17971
(VENDOR_ADVISORY)  SECUNIA  17971
http://lists.horde.org/archives/announce/2005/000234.html
(PATCH)  MLIST  [horde-announce] 20051211 Kronolith H3 (2.0.6) (final)
http://www.vupen.com/english/advisories/2005/2834
(UNKNOWN)  VUPEN  ADV-2005-2834
http://www.sec-consult.com/245.html
(VENDOR_ADVISORY)  MISC  http://www.sec-consult.com/245.html
http://archives.neohapsis.com/archives/fulldisclosure/2005-12/0459.html
(VENDOR_ADVISORY)  FULLDISC  20051211 SEC Consult SA-20051211-0 :: Several XSS issues in Horde Framework, Kronolith Calendar, Mnemo Notes, Nag Tasks and Turba Addressbook
http://www.debian.org/security/2006/dsa-970
(UNKNOWN)  DEBIAN  DSA-970
http://secunia.com/advisories/18827
(UNKNOWN)  SECUNIA  18827

- 漏洞信息

Horde Kronolith多个HTML注入漏洞
低危 跨站脚本
2005-12-13 00:00:00 2006-01-19 00:00:00
远程  
        Kronolith是Horde日历应用程序,提供了基于Web的日历,由SQL数据库或MCAL库支持。
        Kronolith中存在多个HTML注入漏洞,如下:
        1) 认证用户可以在名称字段中("Calendar Name")以任意Javascript代码在"My Calendars"目录下创建日历,并将权限更改为系统所有用户都可以访问。如果受害用户点击了"My Calendars"菜单浏览自己的日历,就会出现所有公共的日历,并执行攻击者的脚本代码。
        2) 在删除事件时没有正确的验证日历事件的标题字段。Kronolith请求"Delete $title"并未经确认页面的进一步验证便生成$title。在使用共享/公共日历时,用户可以读取和删除其他用户的日历事件。
        3) 基本和高级搜索功能未经过滤便生成类和位置字段。攻击者可以公开某一事件并在标题或其他字段中插入常见的搜索字和恶意代码。如果受害用户搜索了该搜索字的话,就会执行插入的脚本代码。
        4) 攻击者可以在事件中加入脚本代码做为参加者的邮件地址。由于没有过滤邮件地址,浏览事件就可以导致执行任意代码。
        5) 用于编辑日历权限的弹出窗口没有过滤日历的标题,可能导致远程执行代码。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
        ftp://ftp.horde.org/pub/kronolith/kronolith-h3-2.0.6.tar.gz

- 漏洞信息

21608
Horde Kronolith Calendar Multiple Field XSS
Remote / Network Access Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

Kronolith contains a flaw that allows a remote cross site scripting attack. This flaw exists because the application does not validate calendar name variables upon submission to the view calendar script. This could allow a user to create a specially crafted URL that would execute arbitrary code in a user's browser within the trust relationship between the browser and the server, leading to a loss of integrity.

- 时间线

2005-12-11 2005-12-02
Unknow Unknow

- 解决方案

Upgrade to version 2.0.6 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

Horde Kronolith Multiple HTML Injection Vulnerabilities
Input Validation Error 15808
Yes No
2005-12-12 12:00:00 2006-12-20 08:52:00
Johannes Greil of SEC Consult is credited with the discovery of these vulnerabilities.

- 受影响的程序版本

SuSE SUSE Linux Enterprise Server 8
+ Linux kernel 2.4.21
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 7
+ Linux kernel 2.4.19
SuSE SUSE Linux Enterprise Server 10
SuSE SUSE Linux Enterprise Desktop 10
S.u.S.E. UnitedLinux 1.0
S.u.S.E. SuSE Linux Standard Server 8.0
S.u.S.E. SuSE Linux School Server for i386
S.u.S.E. SUSE LINUX Retail Solution 8.0
S.u.S.E. SuSE Linux Openexchange Server 4.0
S.u.S.E. SuSE Linux Open-Xchange 4.1
S.u.S.E. SUSE CORE 9 for x86
S.u.S.E. Open-Enterprise-Server 9.0
S.u.S.E. Open-Enterprise-Server 1
S.u.S.E. Office Server
S.u.S.E. Novell Linux Desktop 9.0
S.u.S.E. Linux Professional 10.0 OSS
S.u.S.E. Linux Professional 10.0
S.u.S.E. Linux Professional 9.3 x86_64
S.u.S.E. Linux Professional 9.3
S.u.S.E. Linux Professional 9.2 x86_64
S.u.S.E. Linux Professional 9.2
S.u.S.E. Linux Professional 9.1 x86_64
S.u.S.E. Linux Professional 9.1
S.u.S.E. Linux Professional 9.0 x86_64
S.u.S.E. Linux Professional 9.0
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 8.2
S.u.S.E. Linux Professional 7.3
S.u.S.E. Linux Professional 10.1
S.u.S.E. Linux Personal 10.0 OSS
S.u.S.E. Linux Personal 9.3 x86_64
S.u.S.E. Linux Personal 9.3
S.u.S.E. Linux Personal 9.2 x86_64
S.u.S.E. Linux Personal 9.2
S.u.S.E. Linux Personal 9.1 x86_64
S.u.S.E. Linux Personal 9.1
S.u.S.E. Linux Personal 9.0 x86_64
S.u.S.E. Linux Personal 9.0
S.u.S.E. Linux Personal 8.2
S.u.S.E. Linux Personal 10.1
S.u.S.E. Linux Openexchange Server
S.u.S.E. Linux Office Server
S.u.S.E. Linux Enterprise Server for S/390 9.0
S.u.S.E. Linux Enterprise Server for S/390
S.u.S.E. Linux Enterprise Server 9
S.u.S.E. Linux Desktop 1.0
S.u.S.E. Linux Database Server 0
S.u.S.E. Linux Connectivity Server
Horde Project Kronolith 2.0.5
Horde Project Kronolith 2.0.4
Horde Project Kronolith 1.1.4
Debian Linux 3.1 sparc
Debian Linux 3.1 s/390
Debian Linux 3.1 ppc
Debian Linux 3.1 mipsel
Debian Linux 3.1 mips
Debian Linux 3.1 m68k
Debian Linux 3.1 ia-64
Debian Linux 3.1 ia-32
Debian Linux 3.1 hppa
Debian Linux 3.1 arm
Debian Linux 3.1 amd64
Debian Linux 3.1 alpha
Debian Linux 3.1
Horde Project Kronolith 2.0.6

- 不受影响的程序版本

Horde Project Kronolith 2.0.6

- 漏洞讨论

Kronolith is prone to multiple HTML-injection vulnerabilities. These issues are due to a failure in the application to properly sanitize user-supplied input before using it in dynamically generated content.

Attacker-supplied HTML and script code would be executed in the context of the affected website, potentially allowing for theft of cookie-based authentication credentials. An attacker could also exploit these issues to control how the site is rendered to the user; other attacks are also possible.

- 漏洞利用

No exploit is required.

- 解决方案

Fixes are available.

Please see the referenced vendor advisories for details on obtaining and applying the appropriate updates.


Horde Project Kronolith 1.1.4

Horde Project Kronolith 2.0.4

Horde Project Kronolith 2.0.5

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站