← Volver a CVEs
CVE-2008-1284
N/ADescripcion
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
Detalles CVE
Puntuacion CVSS v3.1N/A
Publicado3/11/2008
Ultima modificacion4/23/2026
Fuentenvd
Avistamientos honeypot0
Productos afectados
horde:groupwarehorde:groupware_webmail_editionhorde:horde
Debilidades (CWE)
CWE-22
Referencias
http://lists.horde.org/archives/announce/2008/000382.html(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000383.html(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000384.html(cve@mitre.org)
http://secunia.com/advisories/29286(cve@mitre.org)
http://secunia.com/advisories/29374(cve@mitre.org)
http://secunia.com/advisories/29400(cve@mitre.org)
http://secunia.com/advisories/30047(cve@mitre.org)
http://security.gentoo.org/glsa/glsa-200805-01.xml(cve@mitre.org)
http://securityreason.com/securityalert/3726(cve@mitre.org)
http://www.debian.org/security/2008/dsa-1519(cve@mitre.org)
http://www.securityfocus.com/archive/1/489239/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/489289/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/28153(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/0822/references(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000382.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.horde.org/archives/announce/2008/000383.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.horde.org/archives/announce/2008/000384.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29286(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29374(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29400(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30047(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200805-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/3726(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1519(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489239/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489289/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/28153(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0822/references(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html(af854a3a-2127-422b-91ae-364da2661108)
Correlaciones IOC
Sin correlaciones registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.