![]() For this, an attacker can craft a malicious email and include an external image that when rendered exploits the vulnerability without further interaction of a victim: the only requirement is to have a victim open the malicious email. The vulnerability can be exploited with a single GET request which can be triggered via Cross-Site-Request-Forgery. ![]() The discovered code vulnerability (CVE-2022-30287) allows an authenticated user of a Horde instance to execute arbitrary code on the underlying server. At the time of writing, no official patch is available. The vulnerability allows an attacker to fully take over an instance as soon as a victim opens an email the attacker sent. This blog post discusses a vulnerability that the Sonar R&D team discovered in Horde Webmail. If a sophisticated adversary could compromise a webmail server, they can intercept every sent and received email, access password-reset links, and sensitive documents, impersonate personnel and steal all credentials of users logging into the webmail service. With so much trust being placed into webmail servers, they naturally become a highly interesting target for attackers. Typically, users log into the webmail server with their email credentials, then the webmail server acts as a proxy to the organization's email server and allows authenticated users to view and send emails. A webmail application enables organizations to host a centralized, browser-based email client for their members.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |