Summary: | <www-apps/egroupware-1.8.004.20120613: remote code execution via php unserialize (CVE-2014-2027) | ||
---|---|---|---|
Product: | Gentoo Security | Reporter: | Agostino Sarubbo <ago> |
Component: | Vulnerabilities | Assignee: | Gentoo Security <security> |
Status: | RESOLVED FIXED | ||
Severity: | normal | CC: | chrisadr, ercpe, web-apps |
Priority: | Normal | ||
Version: | unspecified | ||
Hardware: | All | ||
OS: | Linux | ||
URL: | http://www.openwall.com/lists/oss-security/2014/02/19/3 | ||
Whiteboard: | B2 [glsa cve] | ||
Package list: | Runtime testing required: | --- | |
Deadline: | 2017-07-05 |
Description
Agostino Sarubbo
2014-02-20 16:07:07 UTC
This version is obsolete and no longer maintained by upstream. There is no version available in Portage that matches ">1.8.005" Also: 1.8 is old and EOL. 14.1 has been out for a while and 14.2 RC1 has just been released. CVE-2014-2027 (http://nvd.nist.gov/nvd.cfm?cvename=CVE-2014-2027): eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php. # Michał Górny <mgorny@gentoo.org> (05 Jun 2017) # (on behalf of Treecleaner project) # Unmaintained in Gentoo. Multiple versions behind upstream. Multiple # security vulnerabilities. Removal in 30 days. Bug #509920. www-apps/egroupware commit 828139076827f50e43b62a88d038d1b092371618 Author: Michał Górny <mgorny@gentoo.org> AuthorDate: Wed Jul 5 12:23:14 2017 Commit: Michał Górny <mgorny@gentoo.org> CommitDate: Wed Jul 5 12:35:17 2017 www-apps/egroupware: Remove last-rited pkg, #509920 This issue was resolved and addressed in GLSA 201711-12 at https://security.gentoo.org/glsa/201711-12 by GLSA coordinator Christopher Diaz Riveros (chrisadr). # glsa-check -v -t all Traceback (most recent call last): File "/usr/lib/python-exec/python3.4/glsa-check", line 345, in <module> if myglsa.isVulnerable(): File "/usr/lib64/python3.4/site-packages/gentoolkit/glsa/__init__.py", line 683, in isVulnerable or (None != getMinUpgrade([v,], path["unaff_atoms"])) File "/usr/lib64/python3.4/site-packages/gentoolkit/glsa/__init__.py", line 411, in getMinUpgrade u_installed = reduce(operator.add, [match(u, "vartree") for u in unaffectedList], []) File "/usr/lib64/python3.4/site-packages/gentoolkit/glsa/__init__.py", line 411, in <listcomp> u_installed = reduce(operator.add, [match(u, "vartree") for u in unaffectedList], []) File "/usr/lib64/python3.4/site-packages/gentoolkit/glsa/__init__.py", line 347, in match return db.match(atom) File "/usr/lib64/python3.4/site-packages/portage/dbapi/vartree.py", line 574, in match origdep, mydb=self, use_cache=use_cache, settings=self.settings) File "/usr/lib64/python3.4/site-packages/portage/dbapi/dep_expand.py", line 35, in dep_expand mydep = Atom(mydep, allow_repo=True) File "/usr/lib64/python3.4/site-packages/portage/dep/__init__.py", line 1270, in __init__ raise InvalidAtom(self) portage.exception.InvalidAtom: >=www-apps/egroupware- In future we'd like to ask you to file an own bug for problems with GLSAs (we have an own component for that and tracking comments in already closed bugs have a chance to stay undetected). The reported problem was fixed via https://gitweb.gentoo.org/data/glsa.git/commit/?id=5734ba55387c6cf49565c6c096a4be4ee2b65de5 |