Horde Groupware Webmail Edition 5.2.22 allows injection of arbitrary PHP code via CSV data, leading to remote code execution.
References
Link | Resource |
---|---|
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/DKTNYDBDVJNMVC7QPXQI7CMPLX3USZ2T/ | Mailing List Third Party Advisory |
https://lists.horde.org/archives/announce/2020/001285.html | Mailing List Vendor Advisory |
https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/message/2PRPIFQDGYPQ3F2TF2ETPIL7IYNSVVZQ/ | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/156872/Horde-5.2.22-CSV-Import-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://lists.debian.org/debian-lts-announce/2020/04/msg00008.html | Mailing List Third Party Advisory |
Information
Published : 2020-02-17 07:15
Updated : 2022-01-01 11:54
NVD link : CVE-2020-8518
Mitre link : CVE-2020-8518
JSON object : View
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
Products Affected
debian
- debian_linux
horde
- groupware
fedoraproject
- fedora