secunia: 1) Input passed to item names is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which will be executed in a user's browser session in context of an affected site when the malicious data is viewed. Successful exploitation requires valid user credentials. The vulnerability is reported in Horde versions prior to 3.1.8 and 3.2.1, Horde Groupware versions prior to 1.1.1, and Horde Groupware Webmail Edition versions prior to 1.1.1.
security relevant changes for 3.1.8 http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.312.2.5&r2=1.515.2.312.2.10&ty=h [cjh] SECURITY: Escape item names in the object browser (Bug #6906). security relevant changes for 3.2.1 http://cvs.horde.org/diff.php/horde/docs/CHANGES?r1=1.515.2.392&r2=1.515.2.413&ty=h [cjh] SECURITY: Escape item names in the object browser (Bug #6906).
3.1.8 and 3.2.1 are in the tree. 3.2 was unstable on all arches and has been removed. Target archs for 3.1.8: alpha amd64 hppa ppc sparc x86
x86 stable
alpha/sparc stable
ppc stable
Stable for HPPA.
amd64 stable, sorry for the delay.
time for glsa decision... XSS => I vote NO.
NO too.
*** Bug 233334 has been marked as a duplicate of this bug. ***