Lucene search

K
zdiEsteban Ruiz (mr_me) of Source InciteZDI-20-1042
HistoryAug 19, 2020 - 12:00 a.m.

(0Day) Horde Groupware Webmail Edition Upgrade upgrade_tasks Deserialization of Untrusted Data Remote Code Execution Vulnerability

2020-08-1900:00:00
Esteban Ruiz (mr_me) of Source Incite
www.zerodayinitiative.com
17

This vulnerability allows remote attackers to execute arbitrary code on affected installations of Horde Groupware Webmail Edition. Authentication is required to exploit this vulnerability. The specific flaw exists within Upgrade.php. When parsing the upgrade_tasks parameter, the process does not properly validate user-supplied data, which can result in deserialization of untrusted data. An attacker can leverage this vulnerability to execute code in the context of the www-data user.