[Date Prev][Date Next] [Thread Prev][Thread Next] [Date Index] [Thread Index]

[SECURITY] [DLA 2564-1] php-horde-text-filter security update



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

- -----------------------------------------------------------------------
Debian LTS Advisory DLA-2564-1              debian-lts@lists.debian.org
https://www.debian.org/lts/security/                    Sylvain Beucler
February 18, 2021                           https://wiki.debian.org/LTS
- -----------------------------------------------------------------------

Package        : php-horde-text-filter
Version        : 2.3.5-1+deb9u1
CVE ID         : CVE-2021-26929
Debian Bug     : 982769

Alex Birnberg discovered a cross-site scripting (XSS) vulnerability in
the Horde Application Framework, more precisely its Text Filter API.
An attacker could take control of a user's mailbox by sending a
crafted e-mail.

CVE-2021-26929

    An XSS issue was discovered in Horde Groupware Webmail Edition
    (where the Horde_Text_Filter library is used). The attacker can
    send a plain text e-mail message, with JavaScript encoded as a
    link or email that is mishandled by preProcess in Text2html.php,
    because bespoke use of \x00\x00\x00 and \x01\x01\x01 interferes
    with XSS defenses.

For Debian 9 stretch, this problem has been fixed in version
2.3.5-1+deb9u1.

We recommend that you upgrade your php-horde-text-filter packages.

For the detailed security status of php-horde-text-filter please refer to
its security tracker page at:
https://security-tracker.debian.org/tracker/php-horde-text-filter

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at: https://wiki.debian.org/LTS
-----BEGIN PGP SIGNATURE-----
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=br6E
-----END PGP SIGNATURE-----


Reply to: