Arbitrary Code Injection Affecting php-horde-form package, versions <2.0.18-3.1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
94.84% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Arbitrary Code Injection vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PHPHORDEFORM-449547
  • published29 May 2019
  • disclosed29 May 2019

Introduced: 29 May 2019

CVE-2019-9858  (opens in a new tab)
CWE-94  (opens in a new tab)

How to fix?

Upgrade Debian:unstable php-horde-form to version 2.0.18-3.1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-horde-form package and not the php-horde-form package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the Horde_Form_Type_image method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmp_file passed to move_uploaded_file() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it's never submitted by the forms, which default to securely using a random path.)

CVSS Scores

version 3.1