Your submission was sent successfully! Close

CVE-2019-14466

Published: 31 December 2019

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

Priority

Medium

CVSS 3 base score: 6.5

Status

Package Release Status
gosa
Launchpad, Ubuntu, Debian
bionic Needed

disco Ignored
(reached end-of-life)
eoan Not vulnerable
(2.7.4+reloaded3-10)
focal Not vulnerable
(2.7.4+reloaded3-10)
groovy Not vulnerable
(2.7.4+reloaded3-10)
hirsute Not vulnerable
(2.7.4+reloaded3-10)
impish Not vulnerable
(2.7.4+reloaded3-10)
jammy Not vulnerable
(2.7.4+reloaded3-10)
precise Does not exist

trusty Does not exist

upstream
Released (2.7.4+reloaded3-10)
xenial
Released (2.7.4+reloaded2-9ubuntu1.1)