This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user.
Affected Software | Affected Version | How to fix |
---|---|---|
Horde Groupware |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-20-275 is classified as high due to the potential for remote file creation.
To fix ZDI-20-275, update to the latest version of Horde Groupware Webmail Edition that addresses this vulnerability.
ZDI-20-275 affects installations of Horde Groupware Webmail Edition that are not patched.
Yes, authentication is required to exploit the ZDI-20-275 vulnerability.
The vulnerable component in ZDI-20-275 is the add.php file, which lacks proper validation.