{ "id": "CVE-2014-2027", "sourceIdentifier": "cve@mitre.org", "published": "2015-03-31T14:59:00.063", "lastModified": "2017-11-14T02:29:00.220", "vulnStatus": "Modified", "descriptions": [ { "lang": "en", "value": "eGroupware before 1.8.006.20140217 allows remote attackers to conduct PHP object injection attacks, delete arbitrary files, and possibly execute arbitrary code via the (1) addr_fields or (2) trans parameter to addressbook/csv_import.php, (3) cal_fields or (4) trans parameter to calendar/csv_import.php, (5) info_fields or (6) trans parameter to csv_import.php in (a) projectmanager/ or (b) infolog/, or (7) processed parameter to preferences/inc/class.uiaclprefs.inc.php." }, { "lang": "es", "value": "eGroupware anterior a 1.8.006.20140217 permite a atacantes remotos realizar ataques de inyecci\u00f3n de objetos PHP, eliminar ficheros arbitrarios y posiblemente ejecutar c\u00f3digo arbitrario a trav\u00e9s (1) del par\u00e1metro addr_fields o (2) trans en addressbook/csv_import.php, (3) del par\u00e1metro cal_fields o (4) trans en calendar/csv_import.php, (5) del par\u00e1metro info_fields o (6) trans en csv_import.php en (a) projectmanager/ o (b) infolog/, o (7) del par\u00e1metro processed en preferences/inc/class.uiaclprefs.inc.php." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 6.4, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-94" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:egroupware:egroupware:*:*:*:*:*:*:*:*", "versionEndIncluding": "1.8006", "matchCriteriaId": "ED81A1CD-EBDF-41C5-ACDA-9A8D51C850F6" } ] } ] } ], "references": [ { "url": "http://advisories.mageia.org/MGASA-2014-0116.html", "source": "cve@mitre.org" }, { "url": "http://openwall.com/lists/oss-security/2014/02/19/10", "source": "cve@mitre.org" }, { "url": "http://openwall.com/lists/oss-security/2014/02/19/4", "source": "cve@mitre.org", "tags": [ "Patch" ] }, { "url": "http://sourceforge.net/projects/egroupware/files/eGroupware-1.8/README/download", "source": "cve@mitre.org" }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:087", "source": "cve@mitre.org" }, { "url": "https://security.gentoo.org/glsa/201711-12", "source": "cve@mitre.org" } ] }