HTTP: Horde Arbitrary PHP Code Injection

This signature detects a maliciously crafted HTTP request designed to exploit an insecure eval() statement in Horde PHP. A successful attack can lead to remote arbitrary code execution. An exploit for this vulnerability is currently available.

Extended Description

Horde is prone to a remote PHP code-execution vulnerability. An attacker can exploit this issue to execute arbitrary malicious PHP code and in the context of the webserver process. This may help the attacker compromise the application and the underlying system; other attacks are also possible. Horde versions 3.0 up to 3.0.9 and 3.1.0 are vulnerable; other versions may also be affected.

Affected Products

Debian linux

Short Name
HTTP:PHP:HORDE-EVAL
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Arbitrary CVE-2006-1491 Code Horde Injection PHP bid:17292
Release Date
05/05/2006
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Horde_project

Suse

Debian

Gentoo

CVSS Score

7.5

Found a potential security threat?