Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-x55p-vmqf-hfxg

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

EPSS

Процентиль: 47%
0.00238
Низкий

Связанные уязвимости

CVSS3: 6.5
ubuntu
около 6 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

CVSS3: 6.5
nvd
около 6 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

CVSS3: 6.5
debian
около 6 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable ...

EPSS

Процентиль: 47%
0.00238
Низкий