CVE-2020-8865
Publication date 23 March 2020
Last updated 24 July 2024
Ubuntu priority
Cvss 3 Severity Score
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469.
Status
Package | Ubuntu Release | Status |
---|---|---|
php-horde-trean | 24.10 oracular | Not in release |
24.04 LTS noble | Not in release | |
22.04 LTS jammy | Not in release | |
20.04 LTS focal | Not in release | |
18.04 LTS bionic |
Needs evaluation
|
|
16.04 LTS xenial |
Needs evaluation
|
|
14.04 LTS trusty | Not in release |
Severity score breakdown
Parameter | Value |
---|---|
Base score |
|
Attack vector | Network |
Attack complexity | Low |
Privileges required | Low |
User interaction | None |
Scope | Unchanged |
Confidentiality | Low |
Integrity impact | Low |
Availability impact | Low |
Vector | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L |
References
Other references
- https://lists.horde.org/archives/announce/2020/001286.html
- https://www.zerodayinitiative.com/advisories/ZDI-20-276/
- https://github.com/horde/trean/commit/db0714a0c04d87bda9e2852f1b0d259fc281ca75
- https://github.com/horde/trean/commit/055029f551501803d7e293a48316e2cf31307908
- https://www.cve.org/CVERecord?id=CVE-2020-8865