The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
References
Configurations
Information
Published : 2010-06-22 10:30
Updated : 2023-02-12 20:19
NVD link : CVE-2010-1638
Mitre link : CVE-2010-1638
JSON object : View
CWE
CWE-264
Permissions, Privileges, and Access Controls
Products Affected
horde
- horde