7.5
CVSSv2

CVE-2014-1691

Published: 01/04/2014 Updated: 02/04/2014
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

The framework/Util/lib/Horde/Variables.php script in the Util library in Horde prior to 5.1.1 allows remote malicious users to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.

Vulnerable Product Search on Vulmon Subscribe to Product

horde horde application framework 5.0.4

horde horde application framework 5.0.2

horde horde application framework 5.0.1

horde horde application framework 5.0.0

horde horde application framework

horde horde application framework 5.0.3

Vendor Advisories

Debian Bug report logs - #737149 CVE-2014-1691: Remote code execution in horde < 511 Package: horde3; Maintainer for horde3 is (unknown); Reported by: Micah Anderson <micah@debianorg> Date: Thu, 30 Jan 2014 17:03:02 UTC Severity: serious Tags: security Found in version horde3/338+debian0-2 Fixed in version horde3 ...
Pedro Ribeiro from Agile Information Security found a possible remote code execution on Horde3, a web application framework Unsanitized variables are passed to the unserialize() PHP function A remote attacker could specially-craft one of those variables allowing her to load and execute code For the oldstable distribution (squeeze), this problem ...

Exploits

## # This module requires Metasploit: http//metasploitcom/download # Current source: githubcom/rapid7/metasploit-framework ## require 'msf/core' class Metasploit3 < Msf::Exploit::Remote Rank = ExcellentRanking include Msf::Exploit::Remote::HttpClient def initialize(info = {}) super(update_info(info, 'Name' ...