Description
Multiple cross-site request forgery (CSRF) vulnerabilities in EGroupware Enterprise Line (EPL) before 1.1.20140505, EGroupware Community Edition before 1.8.007.20140506, and EGroupware before 14.1 beta allow remote attackers to hijack the authentication of administrators for requests that (1) create an administrator user via an admin.uiaccounts.add_user action to index.php or (2) modify settings via the newsettings parameter in an admin.uiconfig.index action to index.php. NOTE: vector 2 can be used to execute arbitrary PHP code by leveraging CVE-2014-2988.
Exploits (1)
exploitdb
WORKING POC
by High-Tech Bridge SA · textwebappsphp
https://www.exploit-db.com/exploits/33389
References (7)
Core 7
Core References
Third Party Advisory x_refsource_confirm
http://advisories.mageia.org/MGASA-2014-0221.html
Vendor Advisory vendor-advisory
x_refsource_mandriva
http://www.mandriva.com/security/advisories?name=MDVSA-2015:087
Third Party Advisory third-party-advisory
x_refsource_secunia
http://secunia.com/advisories/58346
Vendor Advisory x_refsource_confirm
http://www.egroupware.org/forum#nabble-td3997580
Exploit x_refsource_misc
https://www.htbridge.com/advisory/HTB23212
Various Sources x_refsource_confirm
http://www.egroupware.org/changelog
Third Party Advisory, VDB Entry mailing-list
x_refsource_bugtraq
http://www.securityfocus.com/archive/1/532103/100/0/threaded
Scores
EPSS
0.0325
EPSS Percentile
87.2%
Details
CWE
CWE-352
Status
published
Products (2)
egroupware/egroupware
< 1.6.001
egroupware/egroupware
< 1.8006
Published
Oct 26, 2014
Tracked Since
Feb 18, 2026