CVE Vulnerabilities

CVE-2022-30287

Use of Externally-Controlled Input to Select Classes or Code ('Unsafe Reflection')

Published: Jul 28, 2022 | Modified: Nov 21, 2024
CVSS 3.x
8
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

Horde Groupware Webmail Edition through 5.2.22 allows a reflection injection attack through which an attacker can instantiate a driver class. This then leads to arbitrary deserialization of PHP objects.

Weakness

The product uses external input with reflection to select which classes or code to use, but it does not sufficiently prevent the input from selecting improper classes or code.

Affected Software

NameVendorStart VersionEnd Version
GroupwareHorde*5.2.22 (including)
Php-horde-turbaUbuntubionic*

Potential Mitigations

References