![]() |
Home ▼ Bookkeeping
Online ▼ Security
Audits ▼
Managed
DNS ▼
About
Order
FAQ
Acceptable Use Policy
Dynamic DNS Clients
Configure Domains Dyanmic DNS Update Password Network
Monitor ▼
Enterprise Package
Advanced Package
Standard Package
Free Trial
FAQ
Price/Feature Summary
Order/Renew
Examples
Configure/Status Alert Profiles | ||
Test ID: | 1.3.6.1.4.1.25623.1.0.142488 |
Category: | Web application abuses |
Title: | Horde Groupware Webmail <= 5.2.22 RCE Vulnerability - Windows |
Summary: | Horde Groupware Webmail is prone to an authenticated remote; code execution (RCE) vulnerability. |
Description: | Summary: Horde Groupware Webmail is prone to an authenticated remote code execution (RCE) vulnerability. Vulnerability Insight: Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. Affected Software/OS: Horde Groupware Webmail version 5.2.22 and prior with Horde Form before version 2.0.19. Solution: Update the Horde Form subcomponent to version 2.0.19 or later. CVSS Score: 6.5 CVSS Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P |
Cross-Ref: |
Common Vulnerability Exposure (CVE) ID: CVE-2019-9858 Bugtraq: 20190624 [SECURITY] [DSA 4468-1] php-horde-form security update (Google Search) https://seclists.org/bugtraq/2019/Jun/31 Debian Security Information: DSA-4468 (Google Search) https://www.debian.org/security/2019/dsa-4468 http://packetstormsecurity.com/files/152476/Horde-Form-Shell-Upload.html https://ssd-disclosure.com/?p=3814&preview=true https://lists.debian.org/debian-lts-announce/2019/06/msg00007.html |
Copyright | Copyright (C) 2019 Greenbone AG |
This is only one of 146377 vulnerability tests in our test suite. Find out more about running a complete security audit. To run a free test of this vulnerability against your system, register below. |