Attacker Value
Unknown
(0 users assessed)
Exploitability
Unknown
(0 users assessed)
User Interaction
Required
Privileges Required
None
Attack Vector
Network
0

CVE-2017-7414

Disclosure Date: April 04, 2017
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user’s preferences, and has enabled the “Should PGP signed messages be automatically verified when viewed?” preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it.

Add Assessment

No one has assessed this topic. Be the first to add your voice to the community.

CVSS V3 Severity and Metrics
Base Score:
7.5 High
Impact Score:
5.9
Exploitability Score:
1.6
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
High
Privileges Required (PR):
None
User Interaction (UI):
Required
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • horde

Products

  • groupware 5.0.0,
  • groupware 5.0.1,
  • groupware 5.0.2,
  • groupware 5.0.3,
  • groupware 5.0.4,
  • groupware 5.0.5,
  • groupware 5.1.0,
  • groupware 5.1.1,
  • groupware 5.1.2,
  • groupware 5.1.3,
  • groupware 5.1.4,
  • groupware 5.1.5,
  • groupware 5.2.0,
  • groupware 5.2.1,
  • groupware 5.2.2,
  • groupware 5.2.3,
  • groupware 5.2.4,
  • groupware 5.2.5,
  • groupware 5.2.6,
  • groupware 5.2.7

Additional Info

Technical Analysis