CVE-2019-14466Deserialization of Untrusted Data in Gosa

Severity
6.5MEDIUMNVD
OSV6.1
EPSS
0.2%
top 54.66%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedDec 31
Latest updateMay 24

Description

The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

debiandebian/gosa< gosa 2.7.4+reloaded3-10 (bookworm)
Debiangosa_project/gosa< 2.7.4+reloaded3-10+3
Ubuntugosa_project/gosa< 2.7.4+reloaded2-9ubuntu1.1
NVDgosa_project/gosa2.7.5.2

Also affects: Debian Linux 8.0

Patches

🔴Vulnerability Details

3
GHSA
GHSA-x55p-vmqf-hfxg: The GOsa_Filter_Settings cookie in GONICUS GOsa 22022-05-24
OSV
gosa vulnerabilities2020-10-28
OSV
CVE-2019-14466: The GOsa_Filter_Settings cookie in GONICUS GOsa 22019-12-31

📋Vendor Advisories

2
Ubuntu
GOsa vulnerabilities2020-10-28
Debian
CVE-2019-14466: gosa - The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP obj...2019