CVE-2014-2922
Published Apr 21, 2014
Last updated 11 years ago
Overview
- Description
- The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 6.4
- Impact score
- 4.9
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:N/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F34DCAF4-F0DB-46BC-9824-5BA8AA6A4621" }, { "criteria": "cpe:2.3:a:pimcore:pimcore:1.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6C7F03F6-8982-4EFE-B369-2A10AC8DDA24" }, { "criteria": "cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "863292F5-89FA-459D-BA9A-2F73F4DE868F" } ], "operator": "OR" } ] } ]