<?xml version="1.0" encoding="UTF-8"?> 
<?xml-stylesheet href="https://dev.horde.org/themes/horde//default/feed-rss.xsl" type="text/xsl"?> 
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
 <channel> 
  <title>Multiple XSS security vulnerabilities</title> 
  <pubDate>Sat, 04 Apr 2026 11:59:44 +0000</pubDate> 
  <link>https://bugs.horde.org/ticket/14857</link> 
  <atom:link rel="self" type="application/rss+xml" title="Multiple XSS security vulnerabilities" href="https://bugs.horde.org/ticket/14857/rss" /> 
  <description>Multiple XSS security vulnerabilities</description> 
 
   
   
  <item> 
   <title>Several security vulnerabilities were publicly disclosed. 
</title> 
   <description>Several security vulnerabilities were publicly disclosed. 

https://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html

They are also known as CVE-2017-16906, CVE-2017-16907, CVE-2017-16908 and CVE-2017-17781.

Are you aware of these issues? The bug reporter claims that they are still present in the latest stable release. If you have already fixed them, I would appreciate more information about the concrete fixes because Debian and other Linux distributions would like to fix those issues.

Thanks in advance

Markus Koschany (apo@debian.org)</description> 
   <pubDate>Mon, 24 Sep 2018 12:18:40 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93043</link> 
  </item> 
   
  <item> 
   <title>This is the first time that I&#039;m seeing these, will investiga</title> 
   <description>This is the first time that I&#039;m seeing these, will investigate.

&gt; Several security vulnerabilities were publicly disclosed.
&gt;
&gt; https://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html
&gt;
&gt; They are also known as CVE-2017-16906, CVE-2017-16907, CVE-2017-16908 
&gt; and CVE-2017-17781.
&gt;
&gt; Are you aware of these issues? The bug reporter claims that they are 
&gt; still present in the latest stable release. If you have already fixed 
&gt; them, I would appreciate more information about the concrete fixes 
&gt; because Debian and other Linux distributions would like to fix those 
&gt; issues.
&gt;
&gt; Thanks in advance
&gt;
&gt; Markus Koschany (apo@debian.org)
</description> 
   <pubDate>Mon, 24 Sep 2018 17:49:29 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93044</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit da2342594b74</title> 
   <description>Changes have been made in Git (master):

commit da2342594b749f1f88747cbb11ecfdc188f64a85
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:10:39 -0400

Bug: 14857

Escape user supplied $color value and prevent XSS vuln.

 M lib/Horde/Core/Ui/VarRenderer/Html.php

https://github.com/horde/Core/commit/da2342594b749f1f88747cbb11ecfdc188f64a85</description> 
   <pubDate>Tue, 25 Sep 2018 16:11:27 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93047</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit ecea6</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit ecea6ea740419e19122a50579ba2903c1cb71d7a
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:11:51 -0400

Bug: 14857

Escape user supplied $color value and prevent XSS vuln.

 M lib/Horde/Core/Ui/VarRenderer/Html.php

https://github.com/horde/Core/commit/ecea6ea740419e19122a50579ba2903c1cb71d7a</description> 
   <pubDate>Tue, 25 Sep 2018 16:11:58 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93048</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit fb211</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit fb2113bbcd04bd4a28c46aad0889fb0a3979a230
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:12:35 -0400

Bug: 14857

Escape user supplied color data, preventing XSS vuln.

 M lib/View/Sidebar.php

https://github.com/horde/base/commit/fb2113bbcd04bd4a28c46aad0889fb0a3979a230</description> 
   <pubDate>Tue, 25 Sep 2018 16:13:10 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93049</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit dcad6626013c</title> 
   <description>Changes have been made in Git (master):

commit dcad6626013cb000a94d77d07cd3933822424f4f
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:13:35 -0400

Bug: 14857

Escape user supplied color data, preventing XSS vuln.

 M lib/View/Sidebar.php

https://github.com/horde/base/commit/dcad6626013cb000a94d77d07cd3933822424f4f</description> 
   <pubDate>Tue, 25 Sep 2018 16:13:43 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93050</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 09d90</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 09d90141292f9ec516a7a2007bf828ce2bbdf60d
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:15:27 -0400

Bug: 14857

Prevent XSS in event&#039;s URL field.

 M lib/Event.php

https://github.com/horde/kronolith/commit/09d90141292f9ec516a7a2007bf828ce2bbdf60d</description> 
   <pubDate>Tue, 25 Sep 2018 16:16:15 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93051</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit 5aea995ec867</title> 
   <description>Changes have been made in Git (master):

commit 5aea995ec867b3ab1f2e34d586b840221932b439
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 12:16:39 -0400

Bug: 14857

Prevent XSS in event&#039;s URL field.

 M lib/Event.php

https://github.com/horde/kronolith/commit/5aea995ec867b3ab1f2e34d586b840221932b439</description> 
   <pubDate>Tue, 25 Sep 2018 16:16:45 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93052</link> 
  </item> 
   
  <item> 
   <title>Hi,

first of all: I&#039;m glad that you solved mentioned bugs</title> 
   <description>Hi,

first of all: I&#039;m glad that you solved mentioned bugs.

In case of &#039;informing&#039; - I tried. :) Please see attached screen.

In case of any questions - feel free to ask.
I&#039;ll answer as soon as possible (probably during next 24h).

Best regards,
Cody Sixteen 



&gt; This is the first time that I&#039;m seeing these, will investigate.
&gt;
&gt;&gt; Several security vulnerabilities were publicly disclosed.
&gt;&gt;
&gt;&gt; https://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html
&gt;&gt;
&gt;&gt; They are also known as CVE-2017-16906, CVE-2017-16907, CVE-2017-16908
&gt;&gt; and CVE-2017-17781.
&gt;&gt;
&gt;&gt; Are you aware of these issues? The bug reporter claims that they are
&gt;&gt; still present in the latest stable release. If you have already fixed
&gt;&gt; them, I would appreciate more information about the concrete fixes
&gt;&gt; because Debian and other Linux distributions would like to fix those
&gt;&gt; issues.
&gt;&gt;
&gt;&gt; Thanks in advance
&gt;&gt;
&gt;&gt; Markus Koschany (apo@debian.org)
&gt;
</description> 
   <pubDate>Tue, 25 Sep 2018 19:56:11 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93053</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 39f74</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 39f740068ad21618f6f70b6e37855c61cadbd716
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 20:21:56 -0400

Bug: 14857

Escape user-provided resource name when outputting. Prevents XSS vuln.

 M js/kronolith.js

https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716</description> 
   <pubDate>Wed, 26 Sep 2018 00:23:13 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93054</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit 17bf57c1fe0e</title> 
   <description>Changes have been made in Git (master):

commit 17bf57c1fe0e5febbef6efeed76cbd98b0422e85
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Tue, 25 Sep 2018 20:23:33 -0400

Bug: 14857

Escape user-provided resource name when outputting. Prevents XSS vuln.

 M js/kronolith.js

https://github.com/horde/kronolith/commit/17bf57c1fe0e5febbef6efeed76cbd98b0422e85</description> 
   <pubDate>Wed, 26 Sep 2018 00:23:39 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93055</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit e8880</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit e88809517ada84e5dadf6da6d528539ea383d700
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 08:32:49 -0400

[mjr] Prevent potential XSS vuln when rendering a colorpicker (Bug #14857).

 M doc/Horde/Core/changelog.yml

https://github.com/horde/Core/commit/e88809517ada84e5dadf6da6d528539ea383d700</description> 
   <pubDate>Wed, 26 Sep 2018 12:53:24 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93061</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 96d17</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 96d17f32fe2bb3ee531d60736ec00aae81dfe480
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 08:32:49 -0400

[mjr] Prevent potential XSS vuln when rendering a colorpicker (Bug #14857).

 M doc/Horde/Core/CHANGES
 M package.xml

https://github.com/horde/Core/commit/96d17f32fe2bb3ee531d60736ec00aae81dfe480</description> 
   <pubDate>Wed, 26 Sep 2018 12:53:25 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93062</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit b8a38</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit b8a38e49de65f0f6e5d97554c1b00fa8aeda028c
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:10:09 -0400

[mjr] SECURITY: Fix XSS vulnerability in event URL field (Bug #14857).

 M docs/changelog.yml

https://github.com/horde/kronolith/commit/b8a38e49de65f0f6e5d97554c1b00fa8aeda028c</description> 
   <pubDate>Wed, 26 Sep 2018 13:20:35 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93063</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 83ecd</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 83ecd2badfac5bc433cf33e8186a80c3f9eb8a51
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:10:09 -0400

[mjr] SECURITY: Fix XSS vulnerability in event URL field (Bug #14857).

 M docs/CHANGES
 M package.xml

https://github.com/horde/kronolith/commit/83ecd2badfac5bc433cf33e8186a80c3f9eb8a51</description> 
   <pubDate>Wed, 26 Sep 2018 13:20:36 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93064</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 6ae7b</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 6ae7be8d5043acb568a686dc7f77de749f6848e7
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:13:43 -0400

[mjr] SECURITY: Fix XSS vulnerability in resource group property view (Bug #14857).

 M docs/changelog.yml

https://github.com/horde/kronolith/commit/6ae7be8d5043acb568a686dc7f77de749f6848e7</description> 
   <pubDate>Wed, 26 Sep 2018 13:20:36 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93065</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit b99a3</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit b99a31396591e4e38e232870c50c3c3e619d58f7
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:13:43 -0400

[mjr] SECURITY: Fix XSS vulnerability in resource group property view (Bug #14857).

 M docs/CHANGES
 M package.xml

https://github.com/horde/kronolith/commit/b99a31396591e4e38e232870c50c3c3e619d58f7</description> 
   <pubDate>Wed, 26 Sep 2018 13:20:37 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93066</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 3cca5</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 3cca562b1b2c074196304684c5263a657a34b826
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 08:57:28 -0400

[mjr] SECURITY: Fix XSS vulnerability when rendering custom background colors in a sidebar row (Bug #14857).

 M docs/changelog.yml

https://github.com/horde/base/commit/3cca562b1b2c074196304684c5263a657a34b826</description> 
   <pubDate>Wed, 26 Sep 2018 13:22:36 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93067</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (FRAMEWORK_5_2):

commit 8253e</title> 
   <description>Changes have been made in Git (FRAMEWORK_5_2):

commit 8253ed9b43a2e7e9d9cf8cdb0b41b19af34ebbc3
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 08:57:28 -0400

[mjr] SECURITY: Fix XSS vulnerability when rendering custom background colors in a sidebar row (Bug #14857).

 M docs/CHANGES
 M package.xml

https://github.com/horde/base/commit/8253ed9b43a2e7e9d9cf8cdb0b41b19af34ebbc3</description> 
   <pubDate>Wed, 26 Sep 2018 13:22:37 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93068</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit 67d72baf06a3</title> 
   <description>Changes have been made in Git (master):

commit 67d72baf06a3451d053d2dc414c75f66503623bc
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:26:49 -0400

[mjr] SECURITY: Fix XSS vulnerability in event URL field (Bug #14857).

 M doc/changelog.yml

https://github.com/horde/kronolith/commit/67d72baf06a3451d053d2dc414c75f66503623bc</description> 
   <pubDate>Wed, 26 Sep 2018 13:27:27 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93069</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit 1e6c5e8eb539</title> 
   <description>Changes have been made in Git (master):

commit 1e6c5e8eb53978916dbc5992507c170362a5f369
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:28:35 -0400

[mjr] SECURITY: Fix XSS vulnerability in resource group property view (Bug #14857).

 M doc/changelog.yml

https://github.com/horde/kronolith/commit/1e6c5e8eb53978916dbc5992507c170362a5f369</description> 
   <pubDate>Wed, 26 Sep 2018 13:29:07 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93070</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit e96c4029b98f</title> 
   <description>Changes have been made in Git (master):

commit e96c4029b98f0edd8cdb6ccc39c499ae2250f38a
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Wed, 26 Sep 2018 09:30:21 -0400

[mjr] SECURITY: Fix XSS vulnerability when rendering custom background colors in a sidebar row (Bug #14857).

 M doc/changelog.yml

https://github.com/horde/base/commit/e96c4029b98f0edd8cdb6ccc39c499ae2250f38a</description> 
   <pubDate>Wed, 26 Sep 2018 13:30:34 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93071</link> 
  </item> 
   
  <item> 
   <title>These are all fixed, and released in

horde/base
horde/Co</title> 
   <description>These are all fixed, and released in

horde/base
horde/Core
horde/Kronolith

A release of the groupware bundles will be forthcoming.</description> 
   <pubDate>Wed, 26 Sep 2018 13:31:53 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93072</link> 
  </item> 
   
  <item> 
   <title>&gt; These are all fixed, and released in
&gt;
&gt; horde/base
&gt; h</title> 
   <description>&gt; These are all fixed, and released in
&gt;
&gt; horde/base
&gt; horde/Core
&gt; horde/Kronolith
&gt;
&gt; A release of the groupware bundles will be forthcoming.

Thank you very much for fixing these issues. Would it be possible to document which commit fixed a specific CVE? That would allow me and others to easily reference the patches.
</description> 
   <pubDate>Wed, 26 Sep 2018 16:43:01 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93077</link> 
  </item> 
   
  <item> 
   <title>&gt;&gt; These are all fixed, and released in
&gt;&gt;
&gt;&gt; horde/base
</title> 
   <description>&gt;&gt; These are all fixed, and released in
&gt;&gt;
&gt;&gt; horde/base
&gt;&gt; horde/Core
&gt;&gt; horde/Kronolith
&gt;&gt;
&gt;&gt; A release of the groupware bundles will be forthcoming.
&gt;
&gt; Thank you very much for fixing these issues. Would it be possible to 
&gt; document which commit fixed a specific CVE? That would allow me and 
&gt; others to easily reference the patches.

Ah, right:

CVE-2017-16906:  https://github.com/horde/kronolith/commit/09d90141292f9ec516a7a2007bf828ce2bbdf60d
CVE-2017-16907: https://github.com/horde/base/commit/fb2113bbcd04bd4a28c46aad0889fb0a3979a230 and
https://github.com/horde/base/commit/fb2113bbcd04bd4a28c46aad0889fb0a3979a230
CVE-2017-16908: https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716

...and now as I&#039;m doing this, I see that the last CVE referenced in your original report wasn&#039;t talked about on that blog page, so I missed it. Let me review that one to see if it&#039;s still pertinent or not....
</description> 
   <pubDate>Wed, 26 Sep 2018 17:44:21 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93082</link> 
  </item> 
   
  <item> 
   <title>CVE-2017-17781 was published in another blog post. I missed </title> 
   <description>CVE-2017-17781 was published in another blog post. I missed it myself, sorry.

https://code610.blogspot.com/2017/12/modus-operandi-horde-52x.html</description> 
   <pubDate>Thu, 27 Sep 2018 13:39:10 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93090</link> 
  </item> 
   
  <item> 
   <title>&gt; CVE-2017-17781 was published in another blog post. I misse</title> 
   <description>&gt; CVE-2017-17781 was published in another blog post. I missed it myself, sorry.
&gt;
&gt; https://code610.blogspot.com/2017/12/modus-operandi-horde-52x.html

As far as 17781 goes, I can&#039;t verify any sql injection vulns. I&#039;ve been in contact with the reporter, but have received no information that suggests there are any sql injection vuln in the areas specified in CVE-2017-17781.

I consider these issues closed.</description> 
   <pubDate>Fri, 28 Sep 2018 17:04:43 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93092</link> 
  </item> 
   
  <item> 
   <title>I have asked the original reporter of CVE-2017-17781 to clar</title> 
   <description>I have asked the original reporter of CVE-2017-17781 to clarify the steps which are needed to produce a SQL injection. If a consensus cannot be reached or if he does not reply to this issue again, I will ask MITRE to review CVE-2017-17781. They might then either reject the issue or mark it as disputed.</description> 
   <pubDate>Sun, 30 Sep 2018 12:57:08 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93095</link> 
  </item> 
   
  <item> 
   <title>Hi,

first of all, thanks for the ping via email. It was a</title> 
   <description>Hi,

first of all, thanks for the ping via email. It was a busy week. ;)

Second: I found copy/paste of requests I used (from Burp on the other VM).

To use them: update your cookie for valid one (you can use Burp) because
to exploit it you&#039;ll need to be an &#039;admin&#039; anyway.

Then, sqlmap should be good to reproduce (-r request.txt).

As far as I remember &#039;display_errors&#039; was enabled.

One note to add: 
I tried those requests (with display_err to On and Off) for version 5.2.19 and .21 as well.
I could not reproduce those &#039;steps&#039; (for mentioned versions) this 
time - so it&#039;s a little surprise for me to be honest. ;)

I did not yet check .22 version. 

As we spoke more privately:
because we can not reproduce it now - it could be a false positive.
But I think if it&#039;s just &#039;depend&#039; on something we don&#039;t know now/yet - that 
is still worth to investigate (from the source code &#039;perspective&#039;).

If I can help - let me know. 

Thank you for your time.

Best regards,
Cody





&gt; I have asked the original reporter of CVE-2017-17781 to clarify the 
&gt; steps which are needed to produce a SQL injection. If a consensus 
&gt; cannot be reached or if he does not reply to this issue again, I will 
&gt; ask MITRE to review CVE-2017-17781. They might then either reject the 
&gt; issue or mark it as disputed.
</description> 
   <pubDate>Sun, 30 Sep 2018 20:53:09 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93096</link> 
  </item> 
   
  <item> 
   <title>(...) files attached below again; comment to delete; thank y</title> 
   <description>(...) files attached below again; comment to delete; thank you</description> 
   <pubDate>Sun, 30 Sep 2018 20:56:22 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93097</link> 
  </item> 
   
  <item> 
   <title>RE

I verified request-files for version .22 as well. 
In</title> 
   <description>RE

I verified request-files for version .22 as well. 
In my opinion those 2 SQLi bugs (for all 3 versions mentioned) 
should be considered as false positives.

For version .22 I was able to &#039;inject&#039; some data but it was garbage.
Below you&#039;ll find few screens.

My post on code610 will now be updated.
I will also ask MITRE to update information about this CVE.

Thkank you for your time.

Best regards,
Cody



&gt; (...) files attached below again; comment to delete; thank you
</description> 
   <pubDate>Sun, 30 Sep 2018 21:27:12 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93098</link> 
  </item> 
   
  <item> 
   <title>I don&#039;t see https://github.com/horde/Core/commit/ecea6ea7404</title> 
   <description>I don&#039;t see https://github.com/horde/Core/commit/ecea6ea740419e19122a50579ba2903c1cb71d7a in Horde_Core 2.31.3...</description> 
   <pubDate>Sun, 07 Oct 2018 14:43:31 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93107</link> 
  </item> 
   
  <item> 
   <title>&gt; I don&#039;t see 
&gt; https://github.com/horde/Core/commit/ecea6</title> 
   <description>&gt; I don&#039;t see 
&gt; https://github.com/horde/Core/commit/ecea6ea740419e19122a50579ba2903c1cb71d7a in Horde_Core 
&gt; 2.31.3...

2.31.3 being the latest on pear.horde.org.

2.31.6 is the latest on Git...</description> 
   <pubDate>Sun, 07 Oct 2018 19:19:00 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93108</link> 
  </item> 
   
  <item> 
   <title>Try again, you probably got on the fallback pear server, whi</title> 
   <description>Try again, you probably got on the fallback pear server, while the main server had temporarily been down.</description> 
   <pubDate>Tue, 09 Oct 2018 08:36:23 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93109</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in Git (master):

commit cb26695ae329</title> 
   <description>Changes have been made in Git (master):

commit cb26695ae3295da10698f92e303a9b90f351fa58
Author: Michael J Rubinsky &lt;mrubinsk@horde.org&gt;
Date:   Sun, 06 Jan 2019 17:47:55 -0500

[mjr] Prevent potential XSS vuln when rendering a colorpicker (Bug #14857).

 M doc/Horde/Core/changelog.yml

https://github.com/horde/Core/commit/cb26695ae3295da10698f92e303a9b90f351fa58</description> 
   <pubDate>Sun, 06 Jan 2019 22:48:02 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/14857#t93201</link> 
  </item> 
   
   
 
 </channel> 
</rss> 
