This is a writeup describing an open redirect vulnerability in Horde webmail's go.php file. The vulnerability allows attackers to redirect users to arbitrary URLs via the 'url' parameter without validation.
Classification
Writeup 90%
Attack Type
Other
Complexity
Trivial
Reliability
Reliable
Target:Horde webmail 5.1 (possibly other versions)
No auth needed
Prerequisites:Access to the vulnerable go.php endpoint