CVE-2014-2027
Egroupware 1.8.005 PHP Object Insertion
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
1Exploited in Wild
-Decision
Descriptions
eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php.
eGroupware anterior a 1.8.006.20140217 permite a atacantes remotos realizar ataques de inyección de objetos PHP, eliminar ficheros arbitrarios y posiblemente ejecutar código arbitrario a través (1) del parámetro addr_fields o (2) trans en addressbook/csv_import.php, (3) del parámetro cal_fields o (4) trans en calendar/csv_import.php, (5) del parámetro info_fields o (6) trans en csv_import.php en (a) projectmanager/ o (b) infolog/, o (7) del parámetro processed en preferences/inc/class.uiaclprefs.inc.php.
eGroupware prior to 1.8.006.20140217 is vulnerable to remote file deletion and possible remote code execution due to user input being passed to PHP's unserialize() method. eGroupWare before 1.8.007 allows logged in users with administrative privileges to remotely execute arbitrary commands on the server. It is also vulnerable to a cross site request forgery vulnerability that allows creating new administrative users.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-02-19 CVE Reserved
- 2014-02-21 CVE Published
- 2014-02-21 First Exploit
- 2024-08-06 CVE Updated
- 2025-03-30 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-94: Improper Control of Generation of Code ('Code Injection')
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://advisories.mageia.org/MGASA-2014-0116.html | X_refsource_confirm | |
http://openwall.com/lists/oss-security/2014/02/19/10 | Mailing List | |
http://sourceforge.net/projects/egroupware/files/eGroupware-1.8/README/download | X_refsource_confirm |
URL | Date | SRC |
---|---|---|
https://packetstorm.news/files/id/125327 | 2014-02-21 |
URL | Date | SRC |
---|---|---|
http://openwall.com/lists/oss-security/2014/02/19/4 | 2017-11-14 |
URL | Date | SRC |
---|---|---|
http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 | 2017-11-14 | |
https://security.gentoo.org/glsa/201711-12 | 2017-11-14 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Egroupware Search vendor "Egroupware" | Egroupware Search vendor "Egroupware" for product "Egroupware" | <= 1.8006 Search vendor "Egroupware" for product "Egroupware" and version " <= 1.8006" | - |
Affected
|