DescriptionThe GOsa_Filter_Settings cookie in GONICUS GOsa is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
NVD severitymedium

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
gosa (PTS)jessie2.7.4+reloaded2-1+deb8u2vulnerable
jessie (security)2.7.4+reloaded2-1+deb8u5fixed
stretch (security), stretch2.7.4+reloaded2-13+deb9u1vulnerable
bullseye, sid2.7.4+reloaded3-10fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs

Notes (fix) (fixing the prev commit)

Search for package or bug name: Reporting problems