Vulnerability Name: | CVE-2020-8865 (CCN-177504) | ||||||||||||
Assigned: | 2020-02-28 | ||||||||||||
Published: | 2020-02-28 | ||||||||||||
Updated: | 2022-10-07 | ||||||||||||
Summary: | This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469. | ||||||||||||
CVSS v3 Severity: | 6.3 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L) 5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
5.7 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 6.5 Medium (CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
| ||||||||||||
Vulnerability Type: | CWE-22 | ||||||||||||
Vulnerability Consequences: | Gain Access | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2020-8865 Source: XF Type: UNKNOWN horde-cve20208865-code-exec(177504) Source: MLIST Type: Mailing List, Third Party Advisory [debian-lts-announce] 20200415 [SECURITY] [DLA 2175-1] php-horde-trean security update Source: CCN Type: Horde Web site Trean H5 (1.1.10) (final) Source: CCN Type: Packet Storm Security [03-12-2020] Horde Groupware Webmail Edition 5.2.22 PHAR Loading Source: CCN Type: Packet Storm Security [03-12-2020] Horde Groupware Webmail Edition 5.2.22 PHP File Inclusion Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-11-2020] Source: CCN Type: ZDI-20-276 Horde Groupware Webmail Edition edit Page Directory Traversal Remote Code Execution Vulnerability Source: CCN Type: ZDI-20-276 Horde Groupware Webmail Edition edit Page Directory Traversal Remote Code Execution Vulnerability Source: MISC Type: Third Party Advisory, VDB Entry https://www.zerodayinitiative.com/advisories/ZDI-20-276/ | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |