The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DSA-1897-1 | New horde3 packages fix arbitrary code execution |
![]() |
EUVD-2009-3219 | The form library in Horde Application Framework 3.2 before 3.2.5 and 3.3 before 3.3.5; Groupware 1.1 before 1.1.6 and 1.2 before 1.2.4; and Groupware Webmail Edition 1.1 before 1.1.6 and 1.2 before 1.2.4; reuses temporary filenames during the upload process which allows remote attackers, with privileges to write to the address book, to overwrite arbitrary files and execute PHP code via crafted Horde_Form_Type_image form field elements. |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Wed, 28 May 2025 14:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
Thu, 22 May 2025 04:30:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T06:22:23.949Z
Reserved: 2009-09-16T00:00:00
Link: CVE-2009-3236

No data.

Status : Deferred
Published: 2009-09-17T10:30:01.360
Modified: 2025-04-09T00:30:58.490
Link: CVE-2009-3236


No data.