Vulnerability Details : CVE-2014-1691
Public exploit exists!
The framework/Util/lib/Horde/Variables.php script in the Util library in Horde before 5.1.1 allows remote attackers to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.
Products affected by CVE-2014-1691
- cpe:2.3:a:horde:horde_application_framework:*:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:horde:horde_application_framework:5.0.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-1691
81.35%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2014-1691
-
Horde Framework Unserialize PHP Code Execution
Disclosure Date: 2013-06-27First seen: 2020-04-26exploit/unix/webapp/horde_unserialize_execThis module exploits a php unserialize() vulnerability in Horde <= 5.1.1 which could be abused to allow unauthenticated users to execute arbitrary code with the permissions of the web server. The dangerous unserialize() exists in the 'lib/Horde/Variables.php' file. T
CVSS scores for CVE-2014-1691
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-1691
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-1691
-
https://github.com/horde/horde/commit/da6afc7e9f4e290f782eca9dbca794f772caccb3
[mms] SECURITY: '_formvars' form input must now be JSON encoded, not … · horde/horde@da6afc7 · GitHubExploit;Patch
-
http://seclists.org/oss-sec/2014/q1/153
oss-sec: Remote code execution in horde < 5.1.1Patch
-
https://github.com/horde/horde/blob/82c400788537cfc0106b68447789ff53793ac086/bundles/groupware/docs/CHANGES#L215
horde/CHANGES at 82c400788537cfc0106b68447789ff53793ac086 · horde/horde · GitHub
-
http://seclists.org/oss-sec/2014/q1/169
oss-sec: Re: Remote code execution in horde < 5.1.1
-
http://www.debian.org/security/2014/dsa-2853
Debian -- Security Information -- DSA-2853-1 horde3
-
http://seclists.org/oss-sec/2014/q1/156
oss-sec: Re: Remote code execution in horde < 5.1.1Patch
Jump to