Описание
The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.
Ссылки
- Vendor Advisory
- Exploit
- Vendor Advisory
- Exploit
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*
cpe:2.3:a:pimcore:pimcore:1.5.0:*:*:*:*:*:*:*
cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*
EPSS
Процентиль: 53%
0.003
Низкий
6.4 Medium
CVSS2
Дефекты
CWE-20
Связанные уязвимости
github
больше 3 лет назад
The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.
EPSS
Процентиль: 53%
0.003
Низкий
6.4 Medium
CVSS2
Дефекты
CWE-20