// For flags

CVE-2010-3313

eGroupWare 1.6.002 and eGroupWare premium line 9.1 - Multiple Vulnerabilities

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters.

phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php en EGroupware v1.4.001+.002; v1.6.001+.002 y posiblemente otras versiones anteriores a v1.6.003 y EPL v9.1 anterior a v9.1.20100309 y v9.2 anterior a v9.2.20100309; permite a atacantes remotos ejecutar código arbitrario a través de metacaracteres shell en los parámetros (1) aspell_path y (2) spellchecker_lang

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2010-03-16 First Exploit
  • 2010-09-13 CVE Reserved
  • 2010-09-22 CVE Published
  • 2024-09-16 CVE Updated
  • 2024-09-17 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.4.001
Search vendor "Egroupware" for product "Egroupware" and version "1.4.001"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.4.001\+.002
Search vendor "Egroupware" for product "Egroupware" and version "1.4.001\+.002"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.4.002
Search vendor "Egroupware" for product "Egroupware" and version "1.4.002"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.6.001
Search vendor "Egroupware" for product "Egroupware" and version "1.6.001"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.6.001\+.002
Search vendor "Egroupware" for product "Egroupware" and version "1.6.001\+.002"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
1.6.002
Search vendor "Egroupware" for product "Egroupware" and version "1.6.002"
-
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
9.1
Search vendor "Egroupware" for product "Egroupware" and version "9.1"
commercial_epl
Affected
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
9.2
Search vendor "Egroupware" for product "Egroupware" and version "9.2"
commercial_epl
Affected