vendor:
Horde Imp
by:
Paolo Serracino - Pietro Minniti - Damiano Proietti
7.5
CVSS
HIGH
Remote Command Execution
78
CWE
Product Name: Horde Imp
Affected Version From: All IMP versions
Affected Version To: All IMP versions
Patch Exists: YES
Related CWE: CVE-2018-19518
CPE: a:horde:imp
Metasploit:
https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/gentoo-linux-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/php-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2018-19518/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp8-cve-2018-19518/
Other Scripts:
N/A
Platforms Tested: Debian/Ubuntu
2019
Horde Imp Unauthenticated Remote Command Execution
Horde Imp, an application that comes with the Horde GroupWare/Webmail suite exposes an unauthenticated debug page with a form that permits IMAP requests to arbitrary hosts. Leveraging the CVE 2018-19518 and no input sanitization is possible to execute shell commands.
Mitigation:
Delete the debug page after installation.