CVE-2019-14466

NameCVE-2019-14466
DescriptionGOsa <= 2.7.5.2 uses unserialize to restore filter settings from a cookie. Since this cookie is supplied by the client, authenticated users can pass arbitrary content to unserialized, which opens GOsa up to a potential PHP object injection.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDLA-1905-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gosa (PTS)jessie2.7.4+reloaded2-1+deb8u2vulnerable
jessie (security)2.7.4+reloaded2-1+deb8u5fixed
stretch, stretch (security)2.7.4+reloaded2-13+deb9u1vulnerable
buster2.7.4+reloaded3-8+deb10u1vulnerable
bullseye, sid2.7.4+reloaded3-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
gosasource(unstable)2.7.4+reloaded3-10
gosasourcejessie2.7.4+reloaded2-1+deb8u5DLA-1905-1

Notes

https://github.com/gosa-project/gosa-core/commit/e1504e9765db2adde8b4685b5c93fbba57df868b (fix)
https://github.com/gosa-project/gosa-core/commit/90b674960335d888c76ca5e99027df8e7fa66f3a (fixing the prev commit)
https://github.com/gosa-project/gosa-core/pull/30#issuecomment-521975100

Search for package or bug name: Reporting problems