GHSA-g7pj-3v97-3vxp

Suggest an improvement
Source
https://github.com/advisories/GHSA-g7pj-3v97-3vxp
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g7pj-3v97-3vxp/GHSA-g7pj-3v97-3vxp.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g7pj-3v97-3vxp
Aliases
  • CVE-2014-2921
Published
2022-05-17T04:46:09Z
Modified
2023-11-08T03:57:36.898348Z
Summary
Pimcore Vulnerable to PHP Object Injection Attacks
Details

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a Zend_Pdf_ElementFactory_Proxy object and a pathname with a trailing \0 character.

Database specific
{
    "nvd_published_at": "2014-04-21T22:55:00Z",
    "cwe_ids": [
        "CWE-94"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2023-08-16T23:23:36Z"
}
References

Affected packages

Packagist / pimcore/pimcore

Package

Name
pimcore/pimcore
Purl
pkg:composer/pimcore/pimcore

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.4.9
Fixed
2.2.0