// For flags

CVE-2014-2027

Egroupware 1.8.005 PHP Object Insertion

Severity Score

9.8
*CVSS v3

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php.

eGroupware anterior a 1.8.006.20140217 permite a atacantes remotos realizar ataques de inyección de objetos PHP, eliminar ficheros arbitrarios y posiblemente ejecutar código arbitrario a través (1) del parámetro addr_fields o (2) trans en addressbook/csv_import.php, (3) del parámetro cal_fields o (4) trans en calendar/csv_import.php, (5) del parámetro info_fields o (6) trans en csv_import.php en (a) projectmanager/ o (b) infolog/, o (7) del parámetro processed en preferences/inc/class.uiaclprefs.inc.php.

eGroupware prior to 1.8.006.20140217 is vulnerable to remote file deletion and possible remote code execution due to user input being passed to PHP's unserialize() method. eGroupWare before 1.8.007 allows logged in users with administrative privileges to remotely execute arbitrary commands on the server. It is also vulnerable to a cross site request forgery vulnerability that allows creating new administrative users.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2014-02-19 CVE Reserved
  • 2014-02-21 CVE Published
  • 2014-02-21 First Exploit
  • 2024-08-06 CVE Updated
  • 2025-03-30 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Egroupware
Search vendor "Egroupware"
Egroupware
Search vendor "Egroupware" for product "Egroupware"
<= 1.8006
Search vendor "Egroupware" for product "Egroupware" and version " <= 1.8006"
-
Affected