← Voltar para CVEs
CVE-2008-1284
N/ADescricao
Directory traversal vulnerability in Horde 3.1.6, Groupware before 1.0.5, and Groupware Webmail Edition before 1.0.6, when running with certain configurations, allows remote authenticated users to read and execute arbitrary files via ".." sequences and a null byte in the theme name.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado3/11/2008
Ultima modificacao4/23/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
horde:groupwarehorde:groupware_webmail_editionhorde:horde
Fraquezas (CWE)
CWE-22
Referencias
http://lists.horde.org/archives/announce/2008/000382.html(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000383.html(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000384.html(cve@mitre.org)
http://secunia.com/advisories/29286(cve@mitre.org)
http://secunia.com/advisories/29374(cve@mitre.org)
http://secunia.com/advisories/29400(cve@mitre.org)
http://secunia.com/advisories/30047(cve@mitre.org)
http://security.gentoo.org/glsa/glsa-200805-01.xml(cve@mitre.org)
http://securityreason.com/securityalert/3726(cve@mitre.org)
http://www.debian.org/security/2008/dsa-1519(cve@mitre.org)
http://www.securityfocus.com/archive/1/489239/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/archive/1/489289/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/28153(cve@mitre.org)
http://www.vupen.com/english/advisories/2008/0822/references(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054(cve@mitre.org)
http://lists.horde.org/archives/announce/2008/000382.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.horde.org/archives/announce/2008/000383.html(af854a3a-2127-422b-91ae-364da2661108)
http://lists.horde.org/archives/announce/2008/000384.html(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29286(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29374(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/29400(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/30047(af854a3a-2127-422b-91ae-364da2661108)
http://security.gentoo.org/glsa/glsa-200805-01.xml(af854a3a-2127-422b-91ae-364da2661108)
http://securityreason.com/securityalert/3726(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2008/dsa-1519(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489239/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/489289/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/28153(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2008/0822/references(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/41054(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00253.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.redhat.com/archives/fedora-package-announce/2008-March/msg00301.html(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.