<?xml version="1.0" encoding="UTF-8"?> 
<?xml-stylesheet href="https://dev.horde.org/themes/horde//default/feed-rss.xsl" type="text/xsl"?> 
<rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom"> 
 <channel> 
  <title>XSS Vulnerability</title> 
  <pubDate>Thu, 09 Apr 2026 22:37:17 +0000</pubDate> 
  <link>https://bugs.horde.org/ticket/9191</link> 
  <atom:link rel="self" type="application/rss+xml" title="XSS Vulnerability" href="https://bugs.horde.org/ticket/9191/rss" /> 
  <description>XSS Vulnerability</description> 
 
   
   
  <item> 
   <title>I have found a Cross Site Scripting vulnerability in Gollem,</title> 
   <description>I have found a Cross Site Scripting vulnerability in Gollem, 

Exploit : http://localhost/horde/gollem/view.php?actionID=view_file&amp;type=txt&amp;file=&lt;!--a75c305b1c0a6022--&gt;&lt;script&gt;alert(&quot;XSS&quot;)&lt;/script&gt;&amp;dir=../baddir/&amp;driver=file

Vulnerable file : view.php (Line 32 - 46)

Vulnerable code :

if (is_callable(array($GLOBALS[&#039;gollem_vfs&#039;], &#039;readStream&#039;))) {
    $stream = $GLOBALS[&#039;gollem_vfs&#039;]-&gt;readStream($filedir, $filename);
    if (is_a($stream, &#039;PEAR_Error&#039;)) {
        Horde::logMessage($stream, __FILE__, __LINE__, PEAR_LOG_NOTICE);
        printf(_(&quot;Access denied to %s&quot;), $filename);
        exit;
    }
} else {
    $data = $GLOBALS[&#039;gollem_vfs&#039;]-&gt;read($filedir, $filename);
    if (is_a($data, &#039;PEAR_Error&#039;)) {
        Horde::logMessage($data, __FILE__, __LINE__, PEAR_LOG_NOTICE);
        printf(_(&quot;Access denied to %s&quot;), $filename);
        exit;
    }
}

I hope you fix the vulnerability asap. Patch in attachment.

Have a nice day.

Nicolas C. [NightMareLmW From DevSec]</description> 
   <pubDate>Sat, 21 Aug 2010 14:20:21 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/9191#t59703</link> 
  </item> 
   
  <item> 
   <title>Changes have been made in CVS for this ticket:

Bug: 9191
Su</title> 
   <description>Changes have been made in CVS for this ticket:

Bug: 9191
Submitted by: nightmare.lmw@anarchynet.org
Fix CSS vulnerability when viewing file data.
http://cvs.horde.org/diff.php/gollem/docs/CHANGES?rt=horde&amp;r1=1.114.2.57&amp;r2=1.114.2.58&amp;ty=u
http://cvs.horde.org/diff.php/gollem/view.php?rt=horde&amp;r1=1.51.2.6&amp;r2=1.51.2.7&amp;ty=u</description> 
   <pubDate>Tue, 24 Aug 2010 18:31:35 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/9191#t59721</link> 
  </item> 
   
  <item> 
   <title>Git master fix:
http://lists.horde.org/archives/commits/201</title> 
   <description>Git master fix:
http://lists.horde.org/archives/commits/2010-August/004747.html

This has been fixed in 1.1.2, although slightly different from your patch - we instead use the Horde::fatal() function which is the preferred way of reporting these kind of errors anyway.

Thank you for your report.</description> 
   <pubDate>Tue, 24 Aug 2010 18:38:26 +0000</pubDate> 
   <link>https://bugs.horde.org/ticket/9191#t59722</link> 
  </item> 
   
   
 
 </channel> 
</rss> 
