Debian 10261 Published by

A php-horde-gollem security update has been released for Debian GNU/Linux 8 LTS to address a reflected Cross-Site Scripting (XSS) vulnerability via the HTTP GET dir parameter in the browser functionality.



DLA 2229-1: php-horde-gollem security update


Package : php-horde-gollem
Version : 3.0.3-2+deb8u1
CVE ID : CVE-2020-8034
Debian Bug : 961649

Gollem, as used in Horde Groupware Webmail Edition and other products,
had been affected by a reflected Cross-Site Scripting (XSS) vulnerability
via the HTTP GET dir parameter in the browser functionality, affecting
breadcrumb output. An attacker could have obtained access to a victim's
webmail account by making them visit a malicious URL.

For Debian 8 "Jessie", this problem has been fixed in version
3.0.3-2+deb8u1.

We recommend that you upgrade your php-horde-gollem packages.

Further information about Debian LTS security advisories, how to apply
these updates to your system and frequently asked questions can be
found at:   https://wiki.debian.org/LTS