The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
References
Configurations
History
07 Nov 2023, 02:05
Type | Values Removed | Values Added |
---|---|---|
Summary | The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. |
13 Feb 2023, 04:19
Type | Values Removed | Values Added |
---|---|---|
Summary | The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation. |
Information
Published : 2010-06-22 17:30
Updated : 2023-12-10 11:03
NVD link : CVE-2010-1638
Mitre link : CVE-2010-1638
CVE.ORG link : CVE-2010-1638
JSON object : View
Products Affected
horde
- horde
CWE
CWE-264
Permissions, Privileges, and Access Controls