Name | CVE-2022-30287 |
Description | Horde Groupware Webmail Edition through 5.2.22 allows a reflection injection attack through which an attacker can instantiate a driver class. This then leads to arbitrary deserialization of PHP objects. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-3090-1, DLA-3923-1 |
Debian Bugs | 1012279 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
php-horde-turba (PTS) | jessie | 4.2.2-3 | vulnerable |
| stretch | 4.2.18-1 | vulnerable |
| buster (security), buster, buster (lts) | 4.2.23-1+deb10u1 | fixed |
| bullseye | 4.2.25-5 | vulnerable |
| bullseye (security) | 4.2.25-5+deb11u2 | fixed |
| sid, bookworm | 4.2.29-2 | fixed |
The information below is based on the following data on fixed versions.
Notes
https://blog.sonarsource.com/horde-webmail-rce-via-email/
https://lists.horde.org/archives/horde/Week-of-Mon-20220530/059225.html
Possible alternative patch: https://github.com/horde/turba/pull/7
Fixed by: https://github.com/horde/turba/commit/0d1e74802dd2ff8758c5b1dd5323a0101d49897d (v4.2.26)
Followup bugfix: https://github.com/horde/turba/commit/006affc530966704937c55611fadb1669026b9f6 (v4.2.27)
Fixed by: https://github.com/horde/turba/commit/3bccab322af4ae96d5925f0ce9f9af0978af924b (v4.2.26)