UBUNTU-CVE-2019-9858

Source
https://ubuntu.com/security/CVE-2019-9858
Import Source
https://github.com/canonical/ubuntu-security-notices/blob/main/osv/cve/2019/UBUNTU-CVE-2019-9858.json
JSON Data
https://api.test.osv.dev/v1/vulns/UBUNTU-CVE-2019-9858
Related
Published
2019-05-29T17:29:00Z
Modified
2025-01-13T10:21:55Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
  • 8.8 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

Remote code execution was discovered in Horde Groupware Webmail 5.2.22 and 5.2.17. Horde/Form/Type.php contains a vulnerable class that handles image upload in forms. When the HordeFormTypeimage method onSubmit() is called on uploads, it invokes the functions getImage() and _getUpload(), which uses unsanitized user input as a path to save the image. The unsanitized POST parameter object[photo][img][file] is saved in the $upload[img][file] PHP variable, allowing an attacker to manipulate the $tmpfile passed to moveuploadedfile() to save the uploaded file. By setting the parameter to (for example) ../usr/share/horde/static/bd.php, one can write a PHP backdoor inside the web root. The static/ destination folder is a good candidate to drop the backdoor because it is always writable in Horde installations. (The unsanitized POST parameter went probably unnoticed because it's never submitted by the forms, which default to securely using a random path.)

References

Affected packages

Ubuntu:Pro:16.04:LTS / php-horde-form

Package

Name
php-horde-form
Purl
pkg:deb/ubuntu/php-horde-form@2.0.12-1build1?arch=source&distro=esm-apps/xenial

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.11-1
2.0.11-2
2.0.12-1
2.0.12-1build1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}

Ubuntu:Pro:18.04:LTS / php-horde-form

Package

Name
php-horde-form
Purl
pkg:deb/ubuntu/php-horde-form@2.0.18-1?arch=source&distro=esm-apps/bionic

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected

Affected versions

2.*

2.0.18-1

Ecosystem specific

{
    "ubuntu_priority": "medium"
}