The framework/Util/lib/Horde/Variables.php script in the Util library in Horde before 5.1.1 allows remote attackers to conduct object injection attacks and execute arbitrary PHP code via a crafted serialized object in the _formvars form.
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.
Link | Tags |
---|---|
https://github.com/horde/horde/blob/82c400788537cfc0106b68447789ff53793ac086/bundles/groupware/docs/CHANGES#L215 | |
http://seclists.org/oss-sec/2014/q1/156 | mailing list patch |
http://seclists.org/oss-sec/2014/q1/153 | mailing list patch |
http://seclists.org/oss-sec/2014/q1/169 | mailing list |
http://www.debian.org/security/2014/dsa-2853 | vendor advisory |
https://github.com/horde/horde/commit/da6afc7e9f4e290f782eca9dbca794f772caccb3 | patch exploit |