CVE-2022-30287

NameCVE-2022-30287
DescriptionHorde Groupware Webmail Edition through 5.2.22 allows a reflection injection attack through which an attacker can instantiate a driver class. This then leads to arbitrary deserialization of PHP objects.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3090-1, DLA-3923-1
Debian Bugs1012279

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-horde-turba (PTS)jessie4.2.2-3vulnerable
stretch4.2.18-1vulnerable
buster (security), buster, buster (lts)4.2.23-1+deb10u1fixed
bullseye4.2.25-5vulnerable
bullseye (security)4.2.25-5+deb11u2fixed
sid, bookworm4.2.29-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-horde-turbasourcejessie(unfixed)end-of-life
php-horde-turbasourcestretch(unfixed)end-of-life
php-horde-turbasourcebuster4.2.23-1+deb10u1DLA-3090-1
php-horde-turbasourcebullseye4.2.25-5+deb11u2DLA-3923-1
php-horde-turbasource(unstable)4.2.25-61012279

Notes

https://blog.sonarsource.com/horde-webmail-rce-via-email/
https://lists.horde.org/archives/horde/Week-of-Mon-20220530/059225.html
Possible alternative patch: https://github.com/horde/turba/pull/7
Fixed by: https://github.com/horde/turba/commit/0d1e74802dd2ff8758c5b1dd5323a0101d49897d (v4.2.26)
Followup bugfix: https://github.com/horde/turba/commit/006affc530966704937c55611fadb1669026b9f6 (v4.2.27)
Fixed by: https://github.com/horde/turba/commit/3bccab322af4ae96d5925f0ce9f9af0978af924b (v4.2.26)

Search for package or bug name: Reporting problems