Logo
-

Byte Open Security

(ByteOS Network)

Log In

Sign Up

ByteOS

Security
Vulnerability Details
Registries
Custom Views
Weaknesses
Attack Patterns
Filters & Tools
Vulnerability Details :

CVE-2017-7414

Summary
Assigner-mitre
Assigner Org ID-8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At-04 Apr, 2017 | 14:00
Updated At-05 Aug, 2024 | 16:04
Rejected At-
Credits

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it.

Vendors
-
Not available
Products
-
Metrics (CVSS)
VersionBase scoreBase severityVector
Weaknesses
Attack Patterns
Solution/Workaround
References
HyperlinkResource Type
EPSS History
Score
Latest Score
-
N/A
No data available for selected date range
Percentile
Latest Percentile
-
N/A
No data available for selected date range
Stakeholder-Specific Vulnerability Categorization (SSVC)
▼Common Vulnerabilities and Exposures (CVE)
cve.org
Assigner:mitre
Assigner Org ID:8254265b-2729-46b6-b9e3-3dfca2d5bfca
Published At:04 Apr, 2017 | 14:00
Updated At:05 Aug, 2024 | 16:04
Rejected At:
▼CVE Numbering Authority (CNA)

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it.

Affected Products
Vendor
n/a
Product
n/a
Versions
Affected
  • n/a
Problem Types
TypeCWE IDDescription
textN/An/a
Type: text
CWE ID: N/A
Description: n/a
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
x_refsource_CONFIRM
https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
mailing-list
x_refsource_MLIST
Hyperlink: https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
Resource:
x_refsource_CONFIRM
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
Resource:
mailing-list
x_refsource_MLIST
▼Authorized Data Publishers (ADP)
CVE Program Container
Affected Products
Metrics
VersionBase scoreBase severityVector
Metrics Other Info
Impacts
CAPEC IDDescription
Solutions

Configurations

Workarounds

Exploits

Credits

Timeline
EventDate
Replaced By

Rejected Reason

References
HyperlinkResource
https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
x_refsource_CONFIRM
x_transferred
https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
mailing-list
x_refsource_MLIST
x_transferred
Hyperlink: https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
Resource:
x_refsource_CONFIRM
x_transferred
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
Resource:
mailing-list
x_refsource_MLIST
x_transferred
Information is not available yet
▼National Vulnerability Database (NVD)
nvd.nist.gov
Source:cve@mitre.org
Published At:04 Apr, 2017 | 14:59
Updated At:20 Apr, 2025 | 01:37

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition 5.x through 5.2.17, OS Command Injection can occur if the user has PGP features enabled in the user's preferences, and has enabled the "Should PGP signed messages be automatically verified when viewed?" preference. To exploit this vulnerability, an attacker can send a PGP signed email (that is maliciously crafted) to the Horde user, who then must either view or preview it.

CISA Catalog
Date AddedDue DateVulnerability NameRequired Action
N/A
Date Added: N/A
Due Date: N/A
Vulnerability Name: N/A
Required Action: N/A
Metrics
TypeVersionBase scoreBase severityVector
Primary3.07.5HIGH
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Primary2.05.1MEDIUM
AV:N/AC:H/Au:N/C:P/I:P/A:P
Type: Primary
Version: 3.0
Base score: 7.5
Base severity: HIGH
Vector:
CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:H/A:H
Type: Primary
Version: 2.0
Base score: 5.1
Base severity: MEDIUM
Vector:
AV:N/AC:H/Au:N/C:P/I:P/A:P
CPE Matches

Horde LLC
horde
>>groupware>>5.0.0
cpe:2.3:a:horde:groupware:5.0.0:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.0
cpe:2.3:a:horde:groupware:5.0.0:rc1:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.1
cpe:2.3:a:horde:groupware:5.0.1:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.2
cpe:2.3:a:horde:groupware:5.0.2:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.3
cpe:2.3:a:horde:groupware:5.0.3:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.4
cpe:2.3:a:horde:groupware:5.0.4:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.0.5
cpe:2.3:a:horde:groupware:5.0.5:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.0
cpe:2.3:a:horde:groupware:5.1.0:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.0
cpe:2.3:a:horde:groupware:5.1.0:rc1:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.1
cpe:2.3:a:horde:groupware:5.1.1:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.2
cpe:2.3:a:horde:groupware:5.1.2:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.3
cpe:2.3:a:horde:groupware:5.1.3:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.4
cpe:2.3:a:horde:groupware:5.1.4:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.1.5
cpe:2.3:a:horde:groupware:5.1.5:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.0
cpe:2.3:a:horde:groupware:5.2.0:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.0
cpe:2.3:a:horde:groupware:5.2.0:rc1:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.1
cpe:2.3:a:horde:groupware:5.2.1:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.2
cpe:2.3:a:horde:groupware:5.2.2:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.3
cpe:2.3:a:horde:groupware:5.2.3:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.4
cpe:2.3:a:horde:groupware:5.2.4:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.5
cpe:2.3:a:horde:groupware:5.2.5:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.6
cpe:2.3:a:horde:groupware:5.2.6:*:*:*:webmail:*:*:*
Horde LLC
horde
>>groupware>>5.2.7
cpe:2.3:a:horde:groupware:5.2.7:*:*:*:webmail:*:*:*
Weaknesses
CWE IDTypeSource
CWE-78Primarynvd@nist.gov
CWE ID: CWE-78
Type: Primary
Source: nvd@nist.gov
Evaluator Description

Evaluator Impact

Evaluator Solution

Vendor Statements

References
HyperlinkSourceResource
https://lists.debian.org/debian-lts-announce/2018/06/msg00006.htmlcve@mitre.org
N/A
https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.htmlcve@mitre.org
Mailing List
Vendor Advisory
https://lists.debian.org/debian-lts-announce/2018/06/msg00006.htmlaf854a3a-2127-422b-91ae-364da2661108
N/A
https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.htmlaf854a3a-2127-422b-91ae-364da2661108
Mailing List
Vendor Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
Source: cve@mitre.org
Resource: N/A
Hyperlink: https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
Source: cve@mitre.org
Resource:
Mailing List
Vendor Advisory
Hyperlink: https://lists.debian.org/debian-lts-announce/2018/06/msg00006.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource: N/A
Hyperlink: https://lists.horde.org/archives/horde/Week-of-Mon-20170403/056767.html
Source: af854a3a-2127-422b-91ae-364da2661108
Resource:
Mailing List
Vendor Advisory

Change History

0
Information is not available yet

Similar CVEs

8Records found

CVE-2007-0579
Matching Score-8
Assigner-MITRE Corporation
ShareView Details
Matching Score-8
Assigner-MITRE Corporation
CVSS Score-5.1||MEDIUM
EPSS-1.02% / 76.33%
||
7 Day CHG~0.00%
Published-30 Jan, 2007 | 17:00
Updated-07 Aug, 2024 | 12:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

Unspecified vulnerability in the calendar component in Horde Groupware Webmail Edition before 1.0, and Groupware before 1.0, allows remote attackers to include certain files via unspecified vectors. NOTE: some of these details are obtained from third party information.

Action-Not Available
Vendor-n/aHorde LLC
Product-groupwaren/a
CVE-2017-7413
Matching Score-6
Assigner-MITRE Corporation
ShareView Details
Matching Score-6
Assigner-MITRE Corporation
CVSS Score-8.8||HIGH
EPSS-18.48% / 94.99%
||
7 Day CHG~0.00%
Published-04 Apr, 2017 | 14:00
Updated-20 Apr, 2025 | 01:37
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In Horde_Crypt before 2.7.6, as used in Horde Groupware Webmail Edition through 5.2.17, OS Command Injection can occur if the attacker is an authenticated Horde Webmail user, has PGP features enabled in their preferences, and attempts to encrypt an email addressed to a maliciously crafted email address.

Action-Not Available
Vendor-n/aHorde LLC
Product-groupwaren/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2021-3934
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
ShareView Details
Matching Score-4
Assigner-Protect AI (formerly huntr.dev)
CVSS Score-7.8||HIGH
EPSS-0.20% / 42.59%
||
7 Day CHG~0.00%
Published-12 Nov, 2021 | 11:45
Updated-03 Aug, 2024 | 17:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
OS Command Injection in ohmyzsh/ohmyzsh

ohmyzsh is vulnerable to Improper Neutralization of Special Elements used in an OS Command

Action-Not Available
Vendor-planetargonohmyzsh
Product-oh_my_zshohmyzsh/ohmyzsh
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2005-10003
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-1.39% / 79.56%
||
7 Day CHG~0.00%
Published-17 Oct, 2024 | 14:00
Updated-14 Nov, 2024 | 19:35
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
mikexstudios Xcomic os command injection

A vulnerability classified as critical has been found in mikexstudios Xcomic up to 0.8.2. This affects an unknown part. The manipulation of the argument cmd leads to os command injection. It is possible to initiate the attack remotely. The complexity of an attack is rather high. The exploitability is told to be difficult. The exploit has been disclosed to the public and may be used. Upgrading to version 0.8.3 is able to address this issue. The patch is named 6ed8e3cc336e29f09c7e791863d0559939da98bf. It is recommended to upgrade the affected component.

Action-Not Available
Vendor-mikexstudiosmikexstudios
Product-xcomicXcomic
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-9262
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-1.91% / 82.56%
||
7 Day CHG~0.00%
Published-20 Aug, 2025 | 23:02
Updated-22 Aug, 2025 | 18:09
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
wong2 mcp-cli oAuth provider.js redirectToAuthorization os command injection

A flaw has been found in wong2 mcp-cli 1.13.0. Affected is the function redirectToAuthorization of the file /src/oauth/provider.js of the component oAuth Handler. This manipulation causes os command injection. The attack may be initiated remotely. The attack is considered to have high complexity. The exploitability is told to be difficult. The exploit has been published and may be used. The vendor was contacted early about this disclosure but did not respond in any way.

Action-Not Available
Vendor-wong2
Product-mcp-cli
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2019-14744
Matching Score-4
Assigner-MITRE Corporation
ShareView Details
Matching Score-4
Assigner-MITRE Corporation
CVSS Score-7.8||HIGH
EPSS-1.08% / 76.94%
||
7 Day CHG~0.00%
Published-07 Aug, 2019 | 14:30
Updated-05 Aug, 2024 | 00:26
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available

In KDE Frameworks KConfig before 5.61.0, malicious desktop files and configuration files lead to code execution with minimal user interaction. This relates to libKF5ConfigCore.so, and the mishandling of .desktop and .directory files, as demonstrated by a shell command on an Icon line in a .desktop file.

Action-Not Available
Vendor-n/aCanonical Ltd.Debian GNU/LinuxopenSUSEKDEFedora ProjectRed Hat, Inc.
Product-enterprise_linux_serverubuntu_linuxdebian_linuxenterprise_linux_workstationfedorakconfigbackports_sleenterprise_linux_desktopn/a
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-5525
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-6.3||MEDIUM
EPSS-0.29% / 51.91%
||
7 Day CHG~0.00%
Published-03 Jun, 2025 | 20:00
Updated-06 Jun, 2025 | 17:27
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Jrohy trojan linux.go LogChan os command injection

A vulnerability was found in Jrohy trojan up to 2.15.3. It has been declared as critical. This vulnerability affects the function LogChan of the file trojan/util/linux.go. The manipulation of the argument c leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-jrohyJrohy
Product-trojantrojan
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
CVE-2025-5030
Matching Score-4
Assigner-VulDB
ShareView Details
Matching Score-4
Assigner-VulDB
CVSS Score-2.3||LOW
EPSS-0.08% / 23.90%
||
7 Day CHG~0.00%
Published-21 May, 2025 | 16:31
Updated-20 Jun, 2025 | 17:40
Rejected-Not Available
Known To Be Used In Ransomware Campaigns?-Not Available
KEV Added-Not Available
KEV Action Due Date-Not Available
Ackites KillWxapkg wxapkg File Parser unpack.go processFile os command injection

A vulnerability was found in Ackites KillWxapkg up to 2.4.1. It has been declared as critical. This vulnerability affects the function processFile of the file internal/unpack/unpack.go of the component wxapkg File Parser. The manipulation leads to os command injection. The attack can be initiated remotely. The complexity of an attack is rather high. The exploitation appears to be difficult. The exploit has been disclosed to the public and may be used.

Action-Not Available
Vendor-ackitesAckites
Product-killwxapkgKillWxapkg
CWE ID-CWE-77
Improper Neutralization of Special Elements used in a Command ('Command Injection')
CWE ID-CWE-78
Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')
Details not found