CVE-2024-40614
https://notcve.org/view.php?id=CVE-2024-40614
EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting. EGroupware anterior al 23.1.20240624 maneja mal una cláusula ORDER BY. • https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624 https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624 https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •
CVE-2023-38328
https://notcve.org/view.php?id=CVE-2023-38328
An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password. Se descubrió un problema en eGroupWare 17.1.20190111. Una vulnerabilidad de almacenamiento de contraseñas incorrectas afecta el panel de configuración en setup/manageheader.php, lo que permite a atacantes remotos autenticados con credenciales de administrador leer una contraseña de base de datos en texto plano. • https://www.gruppotim.it/it/footer/red-team.html • CWE-522: Insufficiently Protected Credentials •