Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2021-26929Cross-site Scripting in Php-horde-text-filter

Severity
6.1MEDIUMNVD
OSV5.5
EPSS
1.6%
top 18.29%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedFeb 14
Latest updateSep 2

Description

An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:NExploitability: 2.8 | Impact: 2.7

Affected Packages3 packages

debiandebian/php-horde-text-filter< php-horde-text-filter 2.3.7-1 (bookworm)
NVDhorde/groupware5.2.22
Debianlinux/linux_kernel< 6.1.85-1+1

Also affects: Debian Linux 9.0

🔴Vulnerability Details

6
OSV
linux-raspi-5.4 vulnerabilities2024-09-02
OSV
linux-aws-5.4 vulnerabilities2024-08-26
OSV
linux-azure-5.4 vulnerabilities2024-08-23
OSV
CVE-2024-26929: In the Linux kernel, the following vulnerability has been resolved: scsi: qla2xxx: Fix double free of fcport The server was crashing after LOGO beca2024-05-01
GHSA
GHSA-qc5g-54hm-vfmc: An XSS issue was discovered in Horde Groupware Webmail Edition through 52022-05-24

💥Exploits & PoCs

1
Exploit-DB
Horde Groupware Webmail 5.2.22 - Stored XSS2021-04-15

📋Vendor Advisories

1
Debian
CVE-2021-26929: php-horde-text-filter - An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (w...2021