Vulnerability Description
EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Egroupware | Egroupware | <= 1.6.001 |
Related Weaknesses (CWE)
References
- http://advisories.mageia.org/MGASA-2014-0221.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:087
- http://www.securityfocus.com/archive/1/532103/100/0/threaded
- https://www.htbridge.com/advisory/HTB23212Exploit
- http://advisories.mageia.org/MGASA-2014-0221.html
- http://www.mandriva.com/security/advisories?name=MDVSA-2015:087
- http://www.securityfocus.com/archive/1/532103/100/0/threaded
- https://www.htbridge.com/advisory/HTB23212Exploit
FAQ
What is CVE-2014-2988?
CVE-2014-2988 is a vulnerability with a CVSS score of 8.5 (HIGH). EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitr...
How severe is CVE-2014-2988?
CVE-2014-2988 has been rated HIGH with a CVSS base score of 8.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2014-2988?
Check the references section above for vendor advisories and patch information. Affected products include: Egroupware Egroupware.