- Description
- The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.
- Source
- cve@mitre.org
- NVD status
- Modified
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
- nvd@nist.gov
- CWE-20
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F34DCAF4-F0DB-46BC-9824-5BA8AA6A4621"
},
{
"criteria": "cpe:2.3:a:pimcore:pimcore:1.5.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6C7F03F6-8982-4EFE-B369-2A10AC8DDA24"
},
{
"criteria": "cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "863292F5-89FA-459D-BA9A-2F73F4DE868F"
}
],
"operator": "OR"
}
]
}
]