22 results (0.007 seconds)

CVSS: 9.8EPSS: 0%CPEs: 1EXPL: 0

EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting. EGroupware anterior al 23.1.20240624 maneja mal una cláusula ORDER BY. • https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624 https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624 https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438 https://syss.de https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047 • CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') •

CVSS: 4.9EPSS: 0%CPEs: 1EXPL: 0

An issue was discovered in eGroupWare 17.1.20190111. An Improper Password Storage vulnerability affects the setup panel of under setup/manageheader.php, which allows authenticated remote attackers with administrator credentials to read a cleartext database password. Se descubrió un problema en eGroupWare 17.1.20190111. Una vulnerabilidad de almacenamiento de contraseñas incorrectas afecta el panel de configuración en setup/manageheader.php, lo que permite a atacantes remotos autenticados con credenciales de administrador leer una contraseña de base de datos en texto plano. • https://www.gruppotim.it/it/footer/red-team.html • CWE-522: Insufficiently Protected Credentials •

CVSS: 6.1EPSS: 0%CPEs: 1EXPL: 0

Stored XSS vulnerability in eGroupware Community Edition before 16.1.20170922 allows an unauthenticated remote attacker to inject JavaScript via the User-Agent HTTP header, which is mishandled during rendering by the application administrator. Una vulnerabilidad de Cross-Site Scripting (XSS) persistente en las versiones anteriores a 16.1.20170922 de eGroupware Community Edition permite que un atacante remoto sin autenticar inyecte código JavaScript mediante la cabecera HTTP User-Agent, la cual no se gestiona correctamente durante el renderizado por parte del administrador de la aplicación. • http://openwall.com/lists/oss-security/2017/09/28/12 https://github.com/EGroupware/egroupware/commit/0ececf8c78f1c3f9ba15465f53a682dd7d89529f • CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') •

CVSS: 8.5EPSS: 0%CPEs: 2EXPL: 1

EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987. EGroupware Enterprise Line (EPL) anterior a 1.1.20140505, EGroupware Community Edition anterior a 1.8.007.20140506, y EGroupware anterior a 14.1 beta permite a administradores remotos autenticados ejecutar código PHP arbitrario a través de valores de rellamada manipulados en la función de PHP call_user_func, tal y como fue demostrado mediante la utilización del parámetro newsettings[system]. NOTA: esto puede ser explotado por atacantes remotos que se aprovechan de CVE-2014-2987. EGroupware version 1.8.006 suffers from code execution and cross site request forgery vulnerabilities. • http://advisories.mageia.org/MGASA-2014-0221.html http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 http://www.securityfocus.com/archive/1/532103/100/0/threaded https://www.htbridge.com/advisory/HTB23212 • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.8EPSS: 1%CPEs: 2EXPL: 2

Multiple cross-site request forgery (CSRF) vulnerabilities in EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator user via an admin.uiaccounts.add_user action to index.php or (2) modify settings via the newsettings parameter in an admin.uiconfig.index action to index.php. NOTE: vector 2 can be used to execute arbitrary PHP code by leveraging CVE-2014-2988. Múltiples vulnerabilidades de CSRF en EGroupware Enterprise Line (EPL) anterior a 1.1.20140505, EGroupware Community Edition anterior a 1.8.007.20140506, y EGroupware anterior a 14.1 beta permiten a atacantes remotos secuestrar la autenticación de administradores para solicitudes que (1) crean un usuarios administrador a través de una acción admin.uiaccounts.add_user en index.php o (2) modifican configuraciones a través del parámetro newsettings en una acción admin.uiconfig.index en index.php. NOTA: el vector 2 puede utilizarse para ejecutar código PHP arbitrario mediante el aprovechamiento de CVE-2014-2988. EGroupware version 1.8.006 suffers from code execution and cross site request forgery vulnerabilities. • https://www.exploit-db.com/exploits/33389 http://advisories.mageia.org/MGASA-2014-0221.html http://secunia.com/advisories/58346 http://www.egroupware.org/changelog http://www.egroupware.org/forum#nabble-td3997580 http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 http://www.securityfocus.com/archive/1/532103/100/0/threaded https://www.htbridge.com/advisory/HTB23212 • CWE-352: Cross-Site Request Forgery (CSRF) •