Package        : php-horde-gollem
Version        : 3.0.3-2+deb8u1
CVE ID         : CVE-2020-8034
Debian Bug     : 961649


Gollem, as used in Horde Groupware Webmail Edition and other products,
had been affected by a reflected Cross-Site Scripting (XSS) vulnerability
via the HTTP GET dir parameter in the browser functionality, affecting
breadcrumb output. An attacker could have obtained access to a victim's
webmail account by making them visit a malicious URL.

For Debian 8 "Jessie", this problem has been fixed in version
3.0.3-2+deb8u1.

We recommend that you upgrade your php-horde-gollem packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

-- 

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22  0782 9AF4 6B30 2577 1B31
mail: sunweaver@debian.org, https://sunweavers.net/

Debian LTS: DLA-2229-1: php-horde-gollem security update

May 31, 2020
Gollem, as used in Horde Groupware Webmail Edition and other products, had been affected by a reflected Cross-Site Scripting (XSS) vulnerability via the HTTP GET dir parameter in t...

Summary

For Debian 8 "Jessie", this problem has been fixed in version
3.0.3-2+deb8u1.

We recommend that you upgrade your php-horde-gollem packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS

--

mike gabriel aka sunweaver (Debian Developer)
fon: +49 (1520) 1976 148

GnuPG Fingerprint: 9BFB AEE8 6C0A A5FF BF22 0782 9AF4 6B30 2577 1B31
mail: sunweaver@debian.org, https://sunweavers.net/



Severity
Package        : php-horde-gollem
Version : 3.0.3-2+deb8u1
CVE ID : CVE-2020-8034
Debian Bug : 961649

Related News