UBUNTU-CVE-2015-8807

Source
https://ubuntu.com/security/CVE-2015-8807
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2015/UBUNTU-CVE-2015-8807.json
JSON Data
https://api.osv.dev/v1/vulns/UBUNTU-CVE-2015-8807
Related
Published
2016-04-13T16:59:00Z
Modified
2025-01-13T10:21:11Z
Severity
  • 6.1 (Medium) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N CVSS Calculator
Summary
[none]
Details

Cross-site scripting (XSS) vulnerability in the renderVarInputnumber function in horde/framework/Core/lib/Horde/Core/Ui/VarRenderer/Html.php in Horde Groupware before 5.2.12 and Horde Groupware Webmail Edition before 5.2.12 allows remote attackers to inject arbitrary web script or HTML via vectors involving numeric form fields.

References

Affected packages

Ubuntu:Pro:14.04:LTS / php-horde-core

Package

Name
php-horde-core
Purl
pkg:deb/ubuntu/php-horde-core@2.11.1-2ubuntu0.1~esm1?arch=source&distro=trusty/esm

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.11.1-2ubuntu0.1~esm1

Affected versions

2.*

2.7.0-1
2.11.1-1
2.11.1-2

Ecosystem specific

{
    "availability": "Available with Ubuntu Pro (Infra-only): https://ubuntu.com/pro",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "2.11.1-2ubuntu0.1~esm1",
            "binary_name": "php-horde-core"
        }
    ]
}

Ubuntu:16.04:LTS / php-horde-core

Package

Name
php-horde-core
Purl
pkg:deb/ubuntu/php-horde-core@2.22.5+debian0-1?arch=source&distro=xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.22.5+debian0-1

Affected versions

2.*

2.20.8+debian0-1
2.22.1+debian0-1
2.22.3+debian0-1
2.22.4+debian0-1

Ecosystem specific

{
    "availability": "No subscription required",
    "ubuntu_priority": "medium",
    "binaries": [
        {
            "binary_version": "2.22.5+debian0-1",
            "binary_name": "php-horde-core"
        }
    ]
}