Vulnerabilities > CVE-2024-40614 - Unspecified vulnerability in Egroupware
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
HIGH Integrity impact
HIGH Availability impact
HIGH Summary
EGroupware before 23.1.20240624 mishandles an ORDER BY clause. This leads to json.php?menuaction=EGroupware\Api\Etemplate\Widget\Nextmatch::ajax_get_rows sort.id SQL injection by authenticated users for Address Book or InfoLog sorting.
Vulnerable Configurations
References
- https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f
- https://github.com/EGroupware/egroupware/commit/553829d30cc2ccdc0e5a8c5a0e16fa03a3399a3f
- https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624
- https://github.com/EGroupware/egroupware/compare/23.1.20240430...23.1.20240624
- https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624
- https://github.com/EGroupware/egroupware/releases/tag/23.1.20240624
- https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438
- https://help.egroupware.org/t/egroupware-maintenance-security-release-23-1-20240624/78438
- https://syss.de
- https://syss.de
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt
- https://www.syss.de/fileadmin/dokumente/Publikationen/Advisories/SYSS-2024-047.txt
- https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047
- https://www.syss.de/pentest-blog/sql-injection-schwachstelle-in-egroupware-syss-2024-047