Executive Summary
Summary | |
---|---|
Title | New phpgroupware packages fix unintended PHP execution and SQL injection |
Informations | |||
---|---|---|---|
Name | DSA-419 | First vendor Publication | 2003-01-09 |
Vendor | Debian | Last vendor Modification | 2003-01-09 |
Severity (Vendor) | N/A | Revision | 1 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
The authors of phpgroupware, a web based groupware system written in PHP, discovered several vulnerabilities. The Common Vulnerabilities and Exposures project identifies the following problems: CAN-2004-0016 In the "calendar" module, "save extension" was not enforced for holiday files. As a result, server-side php scripts may be placed in directories that then could be accessed remotely and cause the webserver to execute those. This was resolved by enforcing the extension ".txt" for holiday files. CAN-2004-0017 Some SQL injection problems (non-escaping of values used in SQL strings) the "calendar" and "infolog" modules. Additionally, the Debian maintainer adjusted the permissions on world writable directories that were accidently created by former postinst during the installation. For the stable distribution (woody) this problem has been fixed in version 0.9.14-0.RC3.2.woody3. For the unstable distribution (sid) this problem has been fixed in version 0.9.14.007-4. We recommend that you upgrade your phpgroupware, phpgroupware-calendar and phpgroupware-infolog packages. |
Original Source
Url : http://www.debian.org/security/2003/dsa-419 |
CPE : Common Platform Enumeration
Type | Description | Count |
---|---|---|
Application | 1 |
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 419-1 (phpgroupware) File : nvt/deb_419_1.nasl |
2005-11-03 | Name : PhpGroupWare calendar server side script execution File : nvt/phpgroupware_server_side_exec_vuln.nasl |
2005-11-03 | Name : PhpGroupWare multiple module SQL injection vulnerabilities File : nvt/phpgroupware_sql_injection.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
6860 | phpGroupWare Calendar Module Holiday File Save Extension Feature Arbitrary Fi... phpGroupWare contains a flaw that may allow a remote attacker to execute arbitrary files. The issue is triggered due to the 'calendar' module which does not enforce the 'save extension' feature for holiday files. It is possible that the flaw may allow a remote attacker to execute arbitrary files resulting in a loss of integrity. |
6857 | phpGroupWare Infolog Module SQL Injection phpGroupWare contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that variables in the 'infolog' module are not verified properly and will allow an attacker to inject or manipulate SQL queries. No further details have been provided. |
2691 | phpGroupWare Calendar Module SQL Injection phpGroupWare contains a flaw that will allow an attacker to inject arbitrary SQL code. The problem is that variables in the 'calendar' module are not verified properly and will allow an attacker to inject or manipulate SQL queries. No further details have been provided. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-419.nasl - Type : ACT_GATHER_INFO |
2004-08-17 | Name : Arbitrary code may be run on the remote host. File : phpgroupware_server_side_exec_vuln.nasl - Type : ACT_ATTACK |
2004-08-17 | Name : A remote web application is prone to multiple SQL injections. File : phpgroupware_sql_injection.nasl - Type : ACT_ATTACK |
Alert History
Date | Informations |
---|---|
2014-02-17 11:33:00 |
|