Name | CVE-2019-14466 |
Description | The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DLA-1905-1 |
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|---|---|---|
gosa (PTS) | bullseye | 2.7.4+reloaded3-16 | fixed |
bookworm | 2.8~git20230203.10abe45+dfsg-1+deb12u2 | fixed | |
sid | 2.8~git20230203.10abe45+dfsg-17 | fixed |
The information below is based on the following data on fixed versions.
Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
---|---|---|---|---|---|---|
gosa | source | jessie | 2.7.4+reloaded2-1+deb8u5 | DLA-1905-1 | ||
gosa | source | stretch | 2.7.4+reloaded2-13+deb9u3 | |||
gosa | source | buster | 2.7.4+reloaded3-8+deb10u2 | |||
gosa | source | (unstable) | 2.7.4+reloaded3-10 |
https://github.com/gosa-project/gosa-core/commit/e1504e9765db2adde8b4685b5c93fbba57df868b (fix)
https://github.com/gosa-project/gosa-core/commit/90b674960335d888c76ca5e99027df8e7fa66f3a (fixing the prev commit)
https://github.com/gosa-project/gosa-core/pull/30#issuecomment-521975100