=====================================================================
                                  CERT-Renater

                       Note d'Information No. 2005/VULN729
_____________________________________________________________________

DATE                      : 23/11/2005

HARDWARE PLATFORM(S)      : /

OPERATING SYSTEM(S)       : Systems running Horde version prior to 2.2.9.

======================================================================

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
Gentoo Linux Security Advisory                           GLSA 200511-20
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -
                                             http://security.gentoo.org/
- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

   Severity: Low
      Title: Horde Application Framework: XSS vulnerability
       Date: November 22, 2005
       Bugs: #112491
         ID: 200511-20

- - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - -

Synopsis
========

The Horde Application Framework is vulnerable to a cross-site scripting
vulnerability which could lead to the compromise of the victim's
browser content.

Background
==========

The Horde Application Framework is a general-purpose web application
framework written in PHP, providing classes for handling preferences,
compression, browser detection, connection tracking, MIME, and more.

Affected packages
=================

     -------------------------------------------------------------------
      Package         /  Vulnerable  /                       Unaffected
     -------------------------------------------------------------------
   1  www-apps/horde       < 2.2.9                             >= 2.2.9

Description
===========

The Horde Team reported a potential XSS vulnerability. Horde fails to
properly escape error messages which may lead to displaying unsanitized
error messages via Notification_Listener::getMessage()

Impact
======

By enticing a user to read a specially-crafted e-mail or using a
manipulated URL, an attacker can execute arbitrary scripts running in
the context of the victim's browser. This could lead to a compromise of
the user's browser content.

Workaround
==========

There is no known workaround at this time.

Resolution
==========

All Horde Application Framework users should upgrade to the latest
version:

     # emerge --sync
     # emerge --ask --oneshot --verbose ">=www-apps/horde-2.2.9"

References
==========

   [ 1 ] CVE-2005-3570
         http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-3570
   [ 2 ] Horde Announcement
         http://lists.horde.org/archives/announce/2005/000231.html

Availability
============

This GLSA and any updates to it are available for viewing at
the Gentoo Security Website:

   http://security.gentoo.org/glsa/glsa-200511-20.xml

Concerns?
=========

Security is a primary focus of Gentoo Linux and ensuring the
confidentiality and security of our users machines is of utmost
importance to us. Any security concerns should be addressed to
security at gentoo.org or alternatively, you may file a bug at
http://bugs.gentoo.org.

License
=======

Copyright 2005 Gentoo Foundation, Inc; referenced text
belongs to its owner(s).

The contents of this document are licensed under the
Creative Commons - Attribution / Share Alike license.

http://creativecommons.org/licenses/by-sa/2.0

======================================================================

         =========================================================
         Les serveurs de référence du CERT-Renater
         http://www.urec.fr/securite
         http://www.cru.fr/securite
         http://www.renater.fr
         =========================================================
         + CERT-RENATER          | tel : 01-53-94-20-44          +
         + 151 bd de l'Hopital   | fax : 01-53-94-20-41          +
         + 75013 Paris           | email: certsvp@renater.fr     +
         =========================================================


