CVE-2014-2988

EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*
cpe:2.3:a:egroupware:egroupware:*:*:*:*:community:*:*:*

History

21 Nov 2024, 02:07

Type Values Removed Values Added
References () http://advisories.mageia.org/MGASA-2014-0221.html - () http://advisories.mageia.org/MGASA-2014-0221.html -
References () http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 - () http://www.mandriva.com/security/advisories?name=MDVSA-2015:087 -
References () http://www.securityfocus.com/archive/1/532103/100/0/threaded - () http://www.securityfocus.com/archive/1/532103/100/0/threaded -
References () https://www.htbridge.com/advisory/HTB23212 - Exploit () https://www.htbridge.com/advisory/HTB23212 - Exploit

Information

Published : 2014-10-27 01:55

Updated : 2024-11-21 02:07


NVD link : CVE-2014-2988

Mitre link : CVE-2014-2988

CVE.ORG link : CVE-2014-2988


JSON object : View

Products Affected

egroupware

  • egroupware
CWE
CWE-94

Improper Control of Generation of Code ('Code Injection')