First published: Mon Mar 23 2020(Updated: )
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469.
Credit: zdi-disclosures@trendmicro.com
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware Webmail Edition | =5.2.22 | |
Debian GNU/Linux | =8.0 | |
Horde Groupware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-8865 is a vulnerability that allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22.
CVE-2020-8865 has a severity rating of 6.3 (Medium).
The affected software is Horde Groupware Webmail Edition 5.2.22.
Yes, authentication is required to exploit CVE-2020-8865.
To fix CVE-2020-8865, it is recommended to update to the latest version of Horde Groupware Webmail Edition.