Vulnerability Description
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Squirrelmail | Squirrelmail | 1.4.22 |
Related Weaknesses (CWE)
References
- https://www.openwall.com/lists/oss-security/2020/06/20/1Mailing ListThird Party Advisory
- https://www.openwall.com/lists/oss-security/2020/06/20/1Mailing ListThird Party Advisory
FAQ
What is CVE-2020-14933?
CVE-2020-14933 is a vulnerability with a CVSS score of 8.8 (HIGH). compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object ...
How severe is CVE-2020-14933?
CVE-2020-14933 has been rated HIGH with a CVSS base score of 8.8/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2020-14933?
Check the references section above for vendor advisories and patch information. Affected products include: Squirrelmail Squirrelmail.