Page 29 of 141 results (0.004 seconds)

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 2

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.1.0 no maneja debidamente un objeto obtenido deserializando un nombre de ruta, lo que permite a atacantes remotos realizar ataques de inyección de objetos PHP y eliminar archivos arbitrarios a través de vectores involucrando un objeto Zend_Http_Response_Stream. • https://www.exploit-db.com/exploits/43886 http://openwall.com/lists/oss-security/2014/04/21/1 http://www.pimcore.org/en/resources/blog/pimcore+2.2+released_b442 https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt • CWE-20: Improper Input Validation •