Vulnerability CVE-2014-2922


Published: 2014-04-21   Modified: 2014-04-22

Description:
The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.

See advisories in our WLB2 database:
Topic
Author
Date
Med.
Pimcore CMS 1.4.9 <2.1.0 Multiple Vulnerabilities
Agile
26.01.2018

CVSS2 => (AV:N/AC:L/Au:N/C:N/I:P/A:P)

CVSS Base Score
Impact Subscore
Exploitability Subscore
6.4/10
4.9/10
10/10
Exploit range
Attack complexity
Authentication
Remote
Low
No required
Confidentiality impact
Integrity impact
Availability impact
None
Partial
Partial
Affected software
Pimcore -> Pimcore 

 References:
https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt
http://www.pimcore.org/en/resources/blog/pimcore+2.2+released_b442
http://openwall.com/lists/oss-security/2014/04/21/1

Copyright 2024, cxsecurity.com

 

Back to Top