CVE-2020-8865 allows remote attackers to execute local PHP files on Horde Groupware Webmail Edition 5.2.22. Learn about the impact, affected systems, exploitation, and mitigation steps.
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10469.
Understanding CVE-2020-8865
This CVE affects Horde Groupware Webmail Edition version 5.2.22.
What is CVE-2020-8865?
CVE-2020-8865 is a vulnerability that allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22.
The Impact of CVE-2020-8865
The vulnerability has a CVSS base score of 6.3, with a medium severity rating. It requires low privileges and user interaction, with low impacts on confidentiality, integrity, and availability.
Technical Details of CVE-2020-8865
Vulnerability Description
The flaw in edit.php of Horde Groupware Webmail Edition 5.2.22 allows remote attackers to execute local PHP files by manipulating the params[template] parameter.
Affected Systems and Versions
Exploitation Mechanism
Attackers can exploit this vulnerability by providing a malicious path in the params[template] parameter, leading to the execution of unauthorized PHP files.
Mitigation and Prevention
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates