Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2017-15235Forced Browsing in Groupware

CWE-425Forced Browsing6 documents6 sources
Severity
7.5HIGHNVD
EPSS
12.7%
top 5.99%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedOct 11
Latest updateMay 13

Description

The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote attackers to bypass Horde authentication for file downloads via a crafted fn parameter that corresponds to the exact filename.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages1 packages

NVDhorde/groupware5.2.21

🔴Vulnerability Details

3
GHSA
GHSA-h443-49fc-9w7v: The File Manager (gollem) module 32022-05-13
CVEList
CVE-2017-15235: The File Manager (gollem) module 32017-10-11
OSV
CVE-2017-15235: The File Manager (gollem) module 32017-10-11

💥Exploits & PoCs

1
Exploit-DB
Horde Groupware 5.2.21 - Unauthorized File Download2017-08-03

📋Vendor Advisories

1
Debian
CVE-2017-15235: php-horde-gollem - The File Manager (gollem) module 3.0.11 in Horde Groupware 5.2.21 allows remote ...2017