Vulnerability Description
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Gosa Project | Gosa | 2.7.5.2 |
| Debian | Debian Linux | 8.0 |
Related Weaknesses (CWE)
References
- https://github.com/gosa-project/gosa-core/pull/29PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/08/msg00039.htmlMailing ListThird Party Advisory
- https://github.com/gosa-project/gosa-core/pull/29PatchThird Party Advisory
- https://lists.debian.org/debian-lts-announce/2019/08/msg00039.htmlMailing ListThird Party Advisory
FAQ
What is CVE-2019-14466?
CVE-2019-14466 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user acc...
How severe is CVE-2019-14466?
CVE-2019-14466 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2019-14466?
Check the references section above for vendor advisories and patch information. Affected products include: Gosa Project Gosa, Debian Debian Linux.