{"id":"UBUNTU-CVE-2017-16908","details":"In Horde Groupware 5.2.19, there is XSS via the Name field during creation of a new Resource. This can be leveraged for remote code execution after compromising an administrator account, because the CVE-2015-7984 CSRF protection mechanism can then be bypassed.","modified":"2025-10-24T04:46:36Z","published":"2017-11-20T20:29:00Z","upstream":["CVE-2017-16908"],"references":[{"type":"REPORT","url":"https://ubuntu.com/security/CVE-2017-16908"},{"type":"REPORT","url":"http://code610.blogspot.com/2017/11/rce-via-xss-horde-5219.html"},{"type":"REPORT","url":"https://github.com/horde/kronolith/commit/39f740068ad21618f6f70b6e37855c61cadbd716"},{"type":"REPORT","url":"https://www.cve.org/CVERecord?id=CVE-2017-16908"}],"affected":[{"package":{"name":"php-horde-kronolith","ecosystem":"Ubuntu:18.04:LTS","purl":"pkg:deb/ubuntu/php-horde-kronolith@4.2.23-1ubuntu1?arch=source&distro=bionic"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"}]}],"versions":["4.2.22-1","4.2.23-1","4.2.23-1ubuntu1"],"ecosystem_specific":{"binaries":[{"binary_version":"4.2.23-1ubuntu1","binary_name":"php-horde-kronolith"}]},"database_specific":{"source":"https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2017/UBUNTU-CVE-2017-16908.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N"},{"type":"Ubuntu","score":"medium"}]}