Lucene search

K
gentooGentoo FoundationGLSA-201711-12
HistoryNov 12, 2017 - 12:00 a.m.

eGroupWare: Remote code execution

2017-11-1200:00:00
Gentoo Foundation
security.gentoo.org
8

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.082 Low

EPSS

Percentile

94.4%

Background

eGroupWare is a suite of web-based group applications including calendar, address book, messenger and email.

Description

It was found that eGroupWare contains multiple code injection vulnerabilities in multiple parameters and routes because of improper input sanitization.

Impact

A remote attacker could execute arbitrary code, delete arbitrary files or inject arbitrary PHP objects via multiple routes.

Workaround

There is no known workaround at this time.

Resolution

Gentoo has discontinued support for eGroupWare and recommends that users unmerge the package:

 # emerge --unmerge "www-apps/egroupware"
OSVersionArchitecturePackageVersionFilename
Gentooanyallwww-apps/egroupware<= 1.8.004.20120613UNKNOWN

7.5 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

0.082 Low

EPSS

Percentile

94.4%