Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2020-14933

Опубликовано: 20 июн. 2020
Источник: nvd
CVSS3: 8.8
CVSS2: 6.5
EPSS Низкий

Описание

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:squirrelmail:squirrelmail:1.4.22:*:*:*:*:*:*:*

EPSS

Процентиль: 71%
0.00657
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.8
ubuntu
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 6.3
redhat
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).

CVSS3: 8.8
debian
больше 5 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachme ...

CVSS3: 8.8
github
больше 3 лет назад

compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request.

EPSS

Процентиль: 71%
0.00657
Низкий

8.8 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502