21 results (0.001 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting. EGroupware anterior al 23.1.20240624 maneja mal una cláusula ORDER BY. • https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624 https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624 https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Stored XSS vulnerability in eGroupware Community Edition before 16.1.20170922 allows an unauthenticated remote attacker to inject JavaScript via the User-Agent HTTP header, which is mishandled during rendering by the application administrator. Una vulnerabilidad de Cross-Site Scripting (XSS) persistente en las versiones anteriores a 16.1.20170922 de eGroupware Community Edition permite que un atacante remoto sin autenticar inyecte código JavaScript mediante la cabecera HTTP User-Agent, la cual no se gestiona correctamente durante el renderizado por parte del administrador de la aplicación. • http://openwall.com/lists/oss-security/2017/09/28/12 https://github.com/EGroupware/egroupware/commit/0ececf8c78f1c3f9ba15465f53a682dd7d89529f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 1

EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987. EGroupware Enterprise Line (EPL) anterior a 1.1.20140505, EGroupware Community Edition anterior a 1.8.007.20140506, y EGroupware anterior a 14.1 beta permite a administradores remotos autenticados ejecutar código PHP arbitrario a través de valores de rellamada manipulados en la función de PHP call_user_func, tal y como fue demostrado mediante la utilización del parámetro newsettings[system]. NOTA: esto puede ser explotado por atacantes remotos que se aprovechan de CVE-2014-2987. EGroupware version 1.8.006 suffers from code execution and cross site request forgery vulnerabilities. • http://advisories.mageia.org/MGASA-2014-0221.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 http://www.securityfocus.com/archive/1/532103/100/0/threaded https://www.htbridge.com/advisory/HTB23212 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 2

Multiple cross-site request forgery (CSRF) vulnerabilities in EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator user via an admin.uiaccounts.add_user action to index.php or (2) modify settings via the newsettings parameter in an admin.uiconfig.index action to index.php. NOTE: vector 2 can be used to execute arbitrary PHP code by leveraging CVE-2014-2988. Múltiples vulnerabilidades de CSRF en EGroupware Enterprise Line (EPL) anterior a 1.1.20140505, EGroupware Community Edition anterior a 1.8.007.20140506, y EGroupware anterior a 14.1 beta permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) crean un usuarios administrador a través de una acción admin.uiaccounts.add_user en index.php o (2) modifican configuraciones a través del parámetro newsettings en una acción admin.uiconfig.index en index.php. NOTA: el vector 2 puede utilizarse para ejecutar código PHP arbitrario mediante el aprovechamiento de CVE-2014-2988. EGroupware version 1.8.006 suffers from code execution and cross site request forgery vulnerabilities. • https://www.exploit-db.com/exploits/33389 http://advisories.mageia.org/MGASA-2014-0221.html http://secunia.com/advisories/58346 http://www.egroupware.org/changelog http://www.egroupware.org/forum#nabble-td3997580 http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 http://www.securityfocus.com/archive/1/532103/100/0/threaded https://www.htbridge.com/advisory/HTB23212 • CWE-352: Cross-Site Request Forgery (CSRF) •

CVSS: 7.5EPSS: 8%CPEs: 1EXPL: 0

eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php. eGroupware anterior a 1.8.006.20140217 permite a atacantes remotos realizar ataques de inyección de objetos PHP, eliminar ficheros arbitrarios y posiblemente ejecutar código arbitrario a través (1) del parámetro addr_fields o (2) trans en addressbook/csv_import.php, (3) del parámetro cal_fields o (4) trans en calendar/csv_import.php, (5) del parámetro info_fields o (6) trans en csv_import.php en (a) projectmanager/ o (b) infolog/, o (7) del parámetro processed en preferences/inc/class.uiaclprefs.inc.php. Egroupware versions 1.8.005 and below suffer from a PHP object insertion vulnerability that can allow for arbitrary file deletion and possibly code execution. • http://advisories.mageia.org/MGASA-2014-0116.html http://openwall.com/lists/oss-security/2014/02/19/10 http://openwall.com/lists/oss-security/2014/02/19/4 http://sourceforge.net/projects/egroupware/files/eGroupware-1.8/README/download http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 https://security.gentoo.org/glsa/201711-12 • CWE-94: Improper Control of Generation of Code ('Code Injection') •