Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2019-14466

Опубликовано: 31 дек. 2019
Источник: ubuntu
Приоритет: medium
CVSS2: 5.5
CVSS3: 6.5

Описание

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needed
devel

not-affected

2.7.4+reloaded3-10
disco

ignored

end of life
eoan

not-affected

2.7.4+reloaded3-10
esm-apps/bionic

needed

esm-apps/focal

not-affected

2.7.4+reloaded3-10
esm-apps/jammy

not-affected

2.7.4+reloaded3-10
esm-apps/noble

not-affected

2.7.4+reloaded3-10
esm-apps/xenial

released

2.7.4+reloaded2-9ubuntu1.1
esm-infra-legacy/trusty

DNE

Показывать по

5.5 Medium

CVSS2

6.5 Medium

CVSS3

Связанные уязвимости

CVSS3: 6.5
nvd
около 6 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

CVSS3: 6.5
debian
около 6 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable ...

github
больше 3 лет назад

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

5.5 Medium

CVSS2

6.5 Medium

CVSS3