Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).
CVE-2020-8865 — Relative Path Traversal in Groupware Webmail Edition
Severity
6.3MEDIUMNVD
EPSS
3.9%
top 11.71%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedMar 23
Latest updateMay 24
Description
This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within edit.php. When parsing the params[template] parameter, the process does not properly validate a user-supplied path prior to using it in file operations. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data…
CVSS vector
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:LExploitability: 2.8 | Impact: 3.4
Affected Packages2 packages
Also affects: Debian Linux 8.0
🔴Vulnerability Details
3GHSA▶
GHSA-ggc2-fj6j-c7cc: This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5↗2022-05-24
OSV▶
CVE-2020-8865: This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5↗2020-03-23
CVEList▶
CVE-2020-8865: This vulnerability allows remote attackers to execute local PHP files on affected installations of Horde Groupware Webmail Edition 5↗2020-03-23
💥Exploits & PoCs
2📋Vendor Advisories
1Debian▶
CVE-2020-8865: php-horde-trean - This vulnerability allows remote attackers to execute local PHP files on affecte...↗2020