CVE-2022-30287

NameCVE-2022-30287
DescriptionHorde Groupware Webmail Edition through 5.2.22 allows a reflection injection attack through which an attacker can instantiate a driver class. This then leads to arbitrary deserialization of PHP objects.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDLA-3090-1, DLA-3923-1
Debian Bugs1012279

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
php-horde-turba (PTS)bullseye4.2.25-5vulnerable
bullseye (security)4.2.25-5+deb11u2fixed
sid, bookworm4.2.29-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
php-horde-turbasourcebuster4.2.23-1+deb10u1DLA-3090-1
php-horde-turbasourcebullseye4.2.25-5+deb11u2DLA-3923-1
php-horde-turbasource(unstable)4.2.25-61012279

Notes

https://blog.sonarsource.com/horde-webmail-rce-via-email/
https://lists.horde.org/archives/horde/Week-of-Mon-20220530/059225.html
Possible alternative patch: https://github.com/horde/turba/pull/7
Fixed by: https://github.com/horde/turba/commit/bc53d856ca87656cdc6e5fafd54f2360eb247e24 (v4.2.26)
Followup bugfix: https://github.com/horde/turba/commit/006affc530966704937c55611fadb1669026b9f6 (v4.2.27)
Fixed by: https://github.com/horde/turba/commit/69f67882539aa0909c3c8c15e37407e0aaa18d1c (v4.2.26)
Fixed by: https://github.com/horde/turba/commit/f09285c54673cd3d71d92a8c56da0a2c5ff329ce (v4.2.28)

Search for package or bug name: Reporting problems