header-logo
Suggest Exploit
vendor:
Webmail
by:
Felipe Andrian Peixoto
3,3
CVSS
LOW
Open Redirect
601
CWE
Product Name: Webmail
Affected Version From: 5.1
Affected Version To: 5.1
Patch Exists: NO
Related CWE: N/A
CPE: horde/util/go.php
Metasploit: N/A
Other Scripts: N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References: N/A
Nuclei Metadata: N/A
Platforms Tested: Windows 7 and Linux
2014

Horde webmail – Open Redirect Vulnerability

An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.

Mitigation:

Validate the parameter value before redirecting the user to the URL.
Source

Exploit-DB raw data:

[+] Horde webmail - Open Redirect Vulnerability 
[+] Date: 31/03/2014
[+] Risk: Low
[+] Remote: Yes
[+] Author: Felipe Andrian Peixoto
[+] Vendor Homepage: http://www.horde.org/apps/webmail
[+] Contact: felipe_andrian@hotmail.com
[+] Tested on: Windows 7 and Linux
[+] Vulnerable File: go.php
[+] Dork: inurl:horde/util/go.php?
[+] Version: 5.1 probably other versions too
[+] Exploit : http://host/horde/util/go.php?url=[ Open Redirect Vul ]

Note : An open redirect is an application that takes a parameter and redirects a user to the parameter value without any validation. 
This vulnerability is used in phishing attacks to get users to visit malicious sites without realizing it.
Reference :https://www.owasp.org/index.php/Open_redirect