Overview
- Description
- EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allows remote authenticated administrators to execute arbitrary PHP code via crafted callback values to the call_user_func PHP function, as demonstrated using the newsettings[system] parameter. NOTE: this can be exploited by remote attackers by leveraging CVE-2014-2987.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 8.5
- Impact score
- 10
- Exploitability score
- 6.8
- Vector string
- AV:N/AC:M/Au:S/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-94
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D189CC87-A256-48C3-9366-67B6FAEFAC80", "versionEndIncluding": "1.6.001" }, { "criteria": "cpe:2.3:a:egroupware:egroupware:*:*:*:*:community:*:*:*", "vulnerable": true, "matchCriteriaId": "668110D7-2136-4DD6-9C09-9FFD48D5F499", "versionEndIncluding": "1.8006" } ], "operator": "OR" } ] } ]