EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 02:07
Type | Values Removed | Values Added |
---|---|---|
References | () http://advisories.mageia.org/MGASA-2014-0221.html - | |
References | () http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 - | |
References | () http://www.securityfocus.com/archive/1/532103/100/0/threaded - | |
References | () https://www.htbridge.com/advisory/HTB23212 - Exploit |
Information
Published : 2014-10-27 01:55
Updated : 2024-11-21 02:07
NVD link : CVE-2014-2988
Mitre link : CVE-2014-2988
CVE.ORG link : CVE-2014-2988
JSON object : View
Products Affected
egroupware
- egroupware
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')