Vulnerability Details : CVE-2009-0932
Directory traversal vulnerability in framework/Image/Image.php in Horde before 3.2.4 and 3.3.3 and Horde Groupware before 1.1.5 allows remote attackers to include and execute arbitrary local files via directory traversal sequences in the Horde_Image driver name.
Vulnerability category: Directory traversal
Products affected by CVE-2009-0932
- cpe:2.3:a:debian:horde:3.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde:3.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde:3.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde:3.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde:3.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde:3.3.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde_groupware:1.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde_groupware:1.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde_groupware:1.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:debian:horde_groupware:1.1.4:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2009-0932
3.83%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 92 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2009-0932
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
6.4
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:P/A:N |
10.0
|
4.9
|
NIST |
CWE ids for CVE-2009-0932
-
The product uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the product does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.Assigned by: nvd@nist.gov (Primary)
References for CVE-2009-0932
-
http://lists.horde.org/archives/announce/2009/000483.html
Vendor Advisory
-
http://lists.opensuse.org/opensuse-security-announce/2009-03/msg00004.html
[security-announce] SUSE Security Summary Report: SUSE-SR:2009:007 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://securityreason.com/securityalert/8077
-
http://cvs.horde.org/co.php/horde/docs/CHANGES?r=1.515.2.503
Vendor Advisory
-
http://cvs.horde.org/co.php/groupware/docs/groupware/CHANGES?r=1.28.2.5
Vendor Advisory
-
http://lists.horde.org/archives/announce/2009/000482.html
Vendor Advisory
-
http://www.securityfocus.com/bid/33491
-
http://cvs.horde.org/co.php/horde/docs/CHANGES?r=1.515.2.413.2.5
Vendor Advisory
-
http://lists.horde.org/archives/announce/2009/000486.html
Vendor Advisory
Jump to