Cross-site Request Forgery (CSRF) Affecting php-horde package, versions <5.2.8+debian0-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

Exploit Maturity
Mature
EPSS
1.48% (87th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Cross-site Request Forgery (CSRF) vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PHPHORDE-289407
  • published19 Nov 2015
  • disclosed19 Nov 2015

Introduced: 19 Nov 2015

CVE-2015-7984  (opens in a new tab)
CWE-352  (opens in a new tab)

How to fix?

Upgrade Debian:unstable php-horde to version 5.2.8+debian0-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-horde package and not the php-horde package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Multiple cross-site request forgery (CSRF) vulnerabilities in Horde before 5.2.8, Horde Groupware before 5.2.11, and Horde Groupware Webmail Edition before 5.2.11 allow remote attackers to hijack the authentication of administrators for requests that execute arbitrary (1) commands via the cmd parameter to admin/cmdshell.php, (2) SQL queries via the sql parameter to admin/sqlshell.php, or (3) PHP code via the php parameter to admin/phpshell.php.

CVSS Scores

version 3.1