An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-2564-1 php-horde-text-filter security update
EUVD EUVD EUVD-2021-13711 An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T20:33:41.620Z

Reserved: 2021-02-09T00:00:00

Link: CVE-2021-26929

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-14T04:15:12.777

Modified: 2024-11-21T05:57:04.023

Link: CVE-2021-26929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.