CVE-2019-14466

Published: 31 December 2019

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

Priority

Medium

CVSS 3 base score: 6.5

Status

Package Release Status
gosa
Launchpad, Ubuntu, Debian
Upstream
Released (2.7.4+reloaded3-10)
Ubuntu 20.10 (Groovy Gorilla) Not vulnerable
(2.7.4+reloaded3-10)
Ubuntu 20.04 LTS (Focal Fossa) Not vulnerable
(2.7.4+reloaded3-10)
Ubuntu 18.04 LTS (Bionic Beaver) Needed

Ubuntu 16.04 LTS (Xenial Xerus)
Released (2.7.4+reloaded2-9ubuntu1.1)
Ubuntu 14.04 ESM (Trusty Tahr) Does not exist

Ubuntu 12.04 ESM (Precise Pangolin) Does not exist