ID CVE-2006-1260
Summary Horde Application Framework 3.0.9 allows remote attackers to read arbitrary files via a null character in the url parameter in services/go.php, which bypasses a sanity check.
References
Vulnerable Configurations
  • cpe:2.3:a:horde:horde:1.2:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.2:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:1.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:1.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.1.3:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.1.3:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.3:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.3:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.4:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.4:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.4_rc1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.4_rc1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.5:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.5:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.6:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.6:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.7:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.7:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.8:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.8:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:2.2.9:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:2.2.9:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.4_rc1:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.4_rc1:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.4_rc2:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.4_rc2:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.6:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.6:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.7:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.7:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.8:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.8:*:*:*:*:*:*:*
  • cpe:2.3:a:horde:horde:3.0.9:*:*:*:*:*:*:*
    cpe:2.3:a:horde:horde:3.0.9:*:*:*:*:*:*:*
CVSS
Base: 5.0 (as of 18-10-2018 - 16:31)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
PARTIAL NONE NONE
cvss-vector via4 AV:N/AC:L/Au:N/C:P/I:N/A:N
refmap via4
bid 17117
bugtraq 20060315 CodeScan Advisory: Unauthenticated Arbitrary File Read in Horde v3.09 and prior
debian
  • DSA-1033
  • DSA-1034
fulldisc 20060315 CodeScan Advisory: Unauthenticated Arbitrary File Read in Horde v3.09 and prior
gentoo GLSA-200604-02
osvdb 23918
sectrack 1015771
secunia
  • 19246
  • 19528
  • 19619
  • 19692
  • 19897
sreason 590
suse SUSE-SR:2006:009
vupen ADV-2006-0959
xf horde-servicesgo-information-disclosure(25239)
Last major update 18-10-2018 - 16:31
Published 19-03-2006 - 02:02
Last modified 18-10-2018 - 16:31
Back to Top