Short Name |
HTTP:PHP:HORDE-EVAL |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
HTTP |
Keywords |
Horde Arbitrary PHP Code Injection |
Release Date |
2006/05/04 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects a maliciously crafted HTTP request designed to exploit an insecure eval() statement in Horde PHP. A successful attack can lead to remote arbitrary code execution. An exploit for this vulnerability is currently available.
Horde is prone to a remote PHP code-execution vulnerability. An attacker can exploit this issue to execute arbitrary malicious PHP code and in the context of the webserver process. This may help the attacker compromise the application and the underlying system; other attacks are also possible. Horde versions 3.0 up to 3.0.9 and 3.1.0 are vulnerable; other versions may also be affected.