The IMP plugin in Horde allows remote attackers to bypass firewall restrictions and use Horde as a proxy to scan internal networks via a crafted request to an unspecified test script. NOTE: this is only a vulnerability when the administrator does not follow recommendations in the product's installation documentation.
References
Configurations
History
No history.
Information
Published : 2010-06-22 17:30
Updated : 2025-04-11 00:51
NVD link : CVE-2010-1638
Mitre link : CVE-2010-1638
CVE.ORG link : CVE-2010-1638
JSON object : View
Products Affected
horde
- horde
CWE
CWE-264
Permissions, Privileges, and Access Controls