Description
An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
Published: 2021-02-14
Score: 6.1 Medium
EPSS: 1.6% Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

No remediation available yet.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DLA Debian DLA DLA-2564-1 php-horde-text-filter security update
EUVD EUVD EUVD-2021-13711 An XSS issue was discovered in Horde Groupware Webmail Edition through 5.2.22 (where the Horde_Text_Filter library before 2.3.7 is used). The attacker can send a plain text e-mail message, with JavaScript encoded as a link or email that is mishandled by preProcess in Text2html.php, because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes with XSS defenses.
History

No history.

Subscriptions

Debian Debian Linux
Horde Groupware
cve-icon MITRE

Status: PUBLISHED

Assigner: mitre

Published:

Updated: 2024-08-03T20:33:41.620Z

Reserved: 2021-02-09T00:00:00.000Z

Link: CVE-2021-26929

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2021-02-14T04:15:12.777

Modified: 2024-11-21T05:57:04.023

Link: CVE-2021-26929

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses