Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2015-7984

Опубликовано: 19 нояб. 2015
Источник: ubuntu
Приоритет: medium
EPSS Низкий
CVSS2: 6.8

Описание

Multiple cross-site request forgery (CSRF) vulnerabilities in Horde before 5.2.8, Horde Groupware before 5.2.11, and Horde Groupware Webmail Edition before 5.2.11 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary (1) commands via the cmd parameter to admin/cmdshell.php, (2) SQL queries via the sql parameter to admin/sqlshell.php, or (3) PHP code via the php parameter to admin/phpshell.php.

РелизСтатусПримечание
artful

ignored

end of life
bionic

not-affected

5.2.9+debian01build1
cosmic

not-affected

5.2.9+debian01build1
devel

not-affected

5.2.9+debian01build1
disco

not-affected

5.2.9+debian01build1
esm-apps/bionic

not-affected

5.2.9+debian01build1
esm-apps/xenial

not-affected

5.2.9+debian01build1
esm-infra-legacy/trusty

DNE

trusty/esm was DNE [trusty was needed]
precise

DNE

precise/esm

DNE

Показывать по

EPSS

Процентиль: 80%
0.0133
Низкий

6.8 Medium

CVSS2

Связанные уязвимости

nvd
около 10 лет назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Horde before 5.2.8, Horde Groupware before 5.2.11, and Horde Groupware Webmail Edition before 5.2.11 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary (1) commands via the cmd parameter to admin/cmdshell.php, (2) SQL queries via the sql parameter to admin/sqlshell.php, or (3) PHP code via the php parameter to admin/phpshell.php.

debian
около 10 лет назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Horde be ...

github
больше 3 лет назад

Multiple cross-site request forgery (CSRF) vulnerabilities in Horde before 5.2.8, Horde Groupware before 5.2.11, and Horde Groupware Webmail Edition before 5.2.11 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary (1) commands via the cmd parameter to admin/cmdshell.php, (2) SQL queries via the sql parameter to admin/sqlshell.php, or (3) PHP code via the php parameter to admin/phpshell.php.

EPSS

Процентиль: 80%
0.0133
Низкий

6.8 Medium

CVSS2