<?xml version="1.0" encoding="UTF-8"?> 
<?xml-stylesheet href="https://dev.horde.org/themes/horde//default/feed-rss.xsl" type="text/xsl"?> 
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
 <channel> 
  <title>The parameter &#039;object[name]&#039; is not sanitized in the page &#039;/horde/turba/add.php&#039;</title> 
  <pubDate>Thu, 09 Apr 2026 22:37:20 +0000</pubDate> 
  <link>https://bugs.horde.org/ticket/6906</link> 
  <atom:link rel="self" type="application/rss+xml" title="The parameter &#039;object[name]&#039; is not sanitized in the page &#039;/horde/turba/add.php&#039;" href="https://bugs.horde.org/ticket/6906/rss" /> 
  <description>The parameter &#039;object[name]&#039; is not sanitized in the page &#039;/horde/turba/add.php&#039;</description> 
 
   
   
  <item> 
   <title>Hello,



I found a security hole in Turba H3 2.1.7

This is</title> 
   <description>Hello,



I found a security hole in Turba H3 2.1.7

This is a Cross Site Scripting (XSS) vulnerability.

The parameter &#039;object[name]&#039; is not sanitized in the page &#039;/horde/turba/add.php&#039;



POC:



&lt;input type=&quot;text&quot; name=&quot;object[name]&quot; id=&quot;object[name]&quot; size=&quot;40&quot; value=&quot;&lt;!--a75c305b1c0a6022--&gt;&lt;script&gt;alert(&#039;XSS by Nicolas Kerschenbaum&#039;);&lt;/script&gt;&quot;  maxlength=&quot;255&quot; /&gt;







Could you tell me if this vulnerability is corrected in the last version of turba (2.2).



Regards



Nicolas Kerschenbaum</description> 
   <pubDate>Thu, 12 Jun 2008 16:28:54 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46330</link> 
  </item> 
   
  <item> 
   <title>Yes, it is.</title> 
   <description>Yes, it is.</description> 
   <pubDate>Thu, 12 Jun 2008 17:01:50 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46333</link> 
  </item> 
   
  <item> 
   <title>Well, there was another problem, but not in add.php itself -</title> 
   <description>Well, there was another problem, but not in add.php itself - are you saying the vulnerability you see is on the add form itself?</description> 
   <pubDate>Thu, 12 Jun 2008 18:24:58 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46336</link> 
  </item> 
   
  <item> 
   <title>1) I add a contact (page: &#039;/horde/turba/add.php&#039;) with the n</title> 
   <description>1) I add a contact (page: &#039;/horde/turba/add.php&#039;) with the name :   Jean Dupont&lt;!--a75c305b1c0a6022--&gt;&lt;script&gt;alert(&#039;XMCO&#039;);&lt;/script&gt;

http://img258.imageshack.us/img258/3708/formao0.png



2) I see my contact list (page: &#039;/horde/services/obrowser/?path=turba/localsql:heremylogin&#039;)

and there is a XSS

http://img246.imageshack.us/img246/5604/xsswt6.png



So, if this security bug is fixed, which version is not vulnerable ?



Regards</description> 
   <pubDate>Fri, 13 Jun 2008 08:59:58 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46389</link> 
  </item> 
   
  <item> 
   <title>your initial report was misleading about where the vulnerabi</title> 
   <description>your initial report was misleading about where the vulnerability is (xss is a display problem, so add.php isn&#039;t the issue). we are currently investigating.</description> 
   <pubDate>Fri, 13 Jun 2008 14:58:12 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46408</link> 
  </item> 
   
  <item> 
   <title>Indeed, the page add.php is not the issue, but the parameter</title> 
   <description>Indeed, the page add.php is not the issue, but the parameter &#039;object[name]&#039;, saved in add.php page, is not sanitized in the page &#039;/horde/services/obrowser/?path=turba/localsql&#039;.



</description> 
   <pubDate>Fri, 13 Jun 2008 15:43:38 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46414</link> 
  </item> 
   
  <item> 
   <title>that&#039;s not even part of turba</title> 
   <description>that&#039;s not even part of turba</description> 
   <pubDate>Fri, 13 Jun 2008 15:52:26 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46415</link> 
  </item> 
   
  <item> 
   <title>So could you remove this ticket, I will post a new one in th</title> 
   <description>So could you remove this ticket, I will post a new one in the Horde Bugs topic.



Regards

</description> 
   <pubDate>Fri, 13 Jun 2008 15:57:39 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46416</link> 
  </item> 
   
  <item> 
   <title>no, i already moved it to the horde queue</title> 
   <description>no, i already moved it to the horde queue</description> 
   <pubDate>Fri, 13 Jun 2008 16:12:11 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46428</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in CVS for this ticket:

http://cvs.h</title> 
   <description>Changes have been made in CVS for this ticket:

http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.1108&amp;r2=1.1109&amp;ty=u
http://cvs.horde.org/diff.php/horde/services/obrowser/index.php?r1=1.18&amp;r2=1.19&amp;ty=u</description> 
   <pubDate>Fri, 13 Jun 2008 21:43:31 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46443</link> 
  </item> 
   
  <item> 
   <title>This is fixed in CVS, and Horde 3.2.1 will be out with the f</title> 
   <description>This is fixed in CVS, and Horde 3.2.1 will be out with the fix presently.</description> 
   <pubDate>Fri, 13 Jun 2008 21:46:20 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/6906#t46444</link> 
  </item> 
   
   
 
 </channel> 
</rss> 
