Unrestricted Upload of File with Dangerous Type Affecting php-horde-form package, versions <2.0.20-1


Severity

Recommended
0.0
medium
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
0.35% (72nd percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Unrestricted Upload of File with Dangerous Type vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-DEBIANUNSTABLE-PHPHORDEFORM-561025
  • published24 Mar 2020
  • disclosed23 Mar 2020

Introduced: 23 Mar 2020

CVE-2020-8866  (opens in a new tab)
CWE-434  (opens in a new tab)

How to fix?

Upgrade Debian:unstable php-horde-form to version 2.0.20-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream php-horde-form package and not the php-horde-form package as distributed by Debian. See How to fix? for Debian:unstable relevant fixed versions and status.

This vulnerability allows remote attackers to create arbitrary files on affected installations of Horde Groupware Webmail Edition 5.2.22. Authentication is required to exploit this vulnerability. The specific flaw exists within add.php. The issue results from the lack of proper validation of user-supplied data, which can allow the upload of arbitrary files. An attacker can leverage this in conjunction with other vulnerabilities to execute code in the context of the www-data user. Was ZDI-CAN-10125.

CVSS Scores

version 3.1