IMP 2.2.6 (SECURITY) released
   
    Brent J. Nordquist
     
    bjn@horde.org
       
    Mon, 23 Jul 2001 07:51:28 -0500 (CDT)
    
    
  
On Sun, 22 Jul 2001, Christopher McCrory <chrismcc@pricegrabber.com> wrote:
> 	I have bee running horde/imp on several machines.  I am using the code
> from cvs.  Is the cvs HEAD tree fixed also?
HEAD is covered for these three; a quick breakdown of the three problems:
> > (1)  A PHPLIB vulnerability allowed an attacker to provide a value for
> > the array element $_PHPLIB[libdir], and thus to get scripts from another
> > server to load and execute.
HEAD doesn't use PHPLIB, so this one doesn't apply.
> > (2)  By using tricky encodings of "javascript:" an attacker can cause
> > malicious JavaScript code to execute in the browser of a user reading
> > email sent by attacker.
Fixes to HEAD for this problem were actually committed before the 2.2.x
back-port was, so this one is covered.
> > (3)  A hostile user that can create a publicly-readable file named
> > "prefs.lang" somewhere on the Apache/PHP server can cause that file to be
> > executed as PHP code.
This one is a particular crack in the armor of imp/prefs.php3 -- the HEAD
code is so different as to make this particular vulnerability not
applicable to it.  (The HEAD code could probably use a review for
"scarlet"-type vulnerabilities.)
-- 
Brent J. Nordquist <bjn@horde.org> N0BJN
Yahoo!: Brent_Nordquist / AIM: BrentJNordquist / ICQ: 76158942