Vulnerability Details : CVE-2014-2027
eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php.
Vulnerability category: Execute code
Products affected by CVE-2014-2027
- cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2014-2027
8.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 94 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2014-2027
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
CWE ids for CVE-2014-2027
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2014-2027
-
http://openwall.com/lists/oss-security/2014/02/19/10
oss-security - Re: CVE request: remote code execution in egroupware <= 1.8.005
-
http://advisories.mageia.org/MGASA-2014-0116.html
Mageia Advisory: MGASA-2014-0116 - Updated egroupware package fixes security vulnerability
-
http://sourceforge.net/projects/egroupware/files/eGroupware-1.8/README/download
EGroupware Enterprise Collaboration - Browse Files at SourceForge.net
-
http://www.mandriva.com/security/advisories?name=MDVSA-2015:087
mandriva.com
-
https://security.gentoo.org/glsa/201711-12
eGroupWare: Remote code execution (GLSA 201711-12) — Gentoo security
-
http://openwall.com/lists/oss-security/2014/02/19/4
oss-security - Re: CVE request: remote code execution in egroupware <= 1.8.005Patch
Jump to