First published: Wed Sep 22 2010(Updated: )
phpgwapi/js/fckeditor/editor/dialog/fck_spellerpages/spellerpages/serverscripts/spellchecker.php in EGroupware 1.4.001+.002; 1.6.001+.002 and possibly other versions before 1.6.003; and EPL 9.1 before 9.1.20100309 and 9.2 before 9.2.20100309; allows remote attackers to execute arbitrary commands via shell metacharacters in the (1) aspell_path or (2) spellchecker_lang parameters.
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Allegro | =9.1 | |
Allegro | =1.4.001\+.002 | |
Allegro | =1.6.001 | |
Allegro | =1.6.001\+.002 | |
Allegro | =1.6.002 | |
Allegro | =9.2 | |
Allegro | =1.4.001 | |
Allegro | =1.4.002 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2010-3313 is considered critical due to its potential for remote command execution.
To fix CVE-2010-3313, you should upgrade to EGroupware version 1.6.003 or later and ensure EPL versions are updated to 9.1.20100309 or later.
CVE-2010-3313 affects EGroupware versions 1.4.001+, 1.6.001+, as well as EPL 9.1 and 9.2 before their respective patch versions.
CVE-2010-3313 allows remote attackers to execute arbitrary commands on the affected servers.
CVE-2010-3313 specifically impacts the EGroupware software suite.