Home page logo

oss-sec logo oss-sec mailing list archives

Re: Remote code execution in horde < 5.1.1
From: Jan Schneider <jan () horde org>
Date: Wed, 29 Jan 2014 12:16:07 +0100

Zitat von Murray McAllister <mmcallis () redhat com>:

On 01/29/2014 11:10 AM, Murray McAllister wrote:
On 01/28/2014 09:10 PM, Pedro Ribeiro wrote:

There is a remote code execution bug in horde affecting all versions from
at least horde 3.1.x to 5.1.1.
This has been fixed in commit

Also check changelog

Can you please assign a CVE for this issue?

Thanks in advance.

PS: while I discovered this bug independently reviewing horde3 code, the
full credit should go to the horde maintainers as they discovered and
it first on horde5.



In Fedora there is horde and php-horde-Horde-Util:


I am not familiar with Horde or know the difference between those
packages, whether one is an older version and the other providing
equivalent functionality to version 5. The github commit in the original
message is in php-horde-Horde-Util for us.

The same vulnerability is in our horde package too, but I could not find
this (horde-3.3.13/lib/Horde/Variables.php) in github:

21 class Variables {
23     var $_vars;
24     var $_expectedVariables = array();
26     function Variables($vars = array())
27     {
28         if (is_null($vars)) {
29             $vars = Util::dispelMagicQuotes($_REQUEST);
30         }
31         if (isset($vars['_formvars'])) {
32             $this->_expectedVariables =
33             unset($vars['_formvars']);
34         }
35         $this->_vars = $vars;

Mailing here in case anyone else is shipping in a similar way (or if
another CVE is needed?).


Murray McAllister / Red Hat Security Response Team

As noted by Remi Collet at [1]:

""horde" is the old application (version 3) build from a single tarball (but still available in the repository)

horde is now distributed via a pear channel and split in ~100 packages.

php-pear-Horde-Util 2.3.0 (with this fix) is already in the repository (but not yet used as pear-horde-horde 5.1.5 is still under review)."

Sorry for the noise!

[1] https://bugzilla.redhat.com/show_bug.cgi?id=1059000#c3

Murray McAllister / Red Hat Security Response Team

Packagers, please note that applying only this patch will break all forms in Horde. The changed serialization method need to be used in the Horde_Form package too.
This is happening since Horde_Form 2.0.5 and introduced with this commit:

Jan Schneider
The Horde Project

  By Date           By Thread  

Current thread:
[ Nmap | Sec Tools | Mailing Lists | Site News | About/Contact | Advertising | Privacy ]