| Name | CVE-2019-14466 |
| Description | The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie. |
| Source | CVE (at NVD; CERT, ENISA, LWN, oss-sec, fulldisc, Debian ELTS, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
| References | DLA-1905-1 |
The table below lists information on source packages.
| Source Package | Release | Version | Status |
|---|---|---|---|
| gosa (PTS) | bullseye | 2.7.4+reloaded3-16 | fixed |
| bookworm | 2.8~git20230203.10abe45+dfsg-1+deb12u2 | fixed | |
| forky, sid, trixie | 2.8~git20230203.10abe45+dfsg-19 | fixed |
The information below is based on the following data on fixed versions.
| Package | Type | Release | Fixed Version | Urgency | Origin | Debian Bugs |
|---|---|---|---|---|---|---|
| gosa | source | jessie | 2.7.4+reloaded2-1+deb8u5 | DLA-1905-1 | ||
| gosa | source | stretch | 2.7.4+reloaded2-13+deb9u3 | |||
| gosa | source | buster | 2.7.4+reloaded3-8+deb10u2 | |||
| gosa | source | (unstable) | 2.7.4+reloaded3-10 |
https://github.com/gosa-project/gosa-core/commit/e1504e9765db2adde8b4685b5c93fbba57df868b (fix)
https://github.com/gosa-project/gosa-core/commit/90b674960335d888c76ca5e99027df8e7fa66f3a (fixing the prev commit)
https://github.com/gosa-project/gosa-core/pull/30#issuecomment-521975100