Page 29 of 142 results (0.002 seconds)

CVSS: 7.5EPSS: 6%CPEs: 4EXPL: 2

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a Zend_Pdf_ElementFactory_Proxy object and a pathname with a trailing \0 character. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.0.0 no maneja debidamente un objeto obtenido deserializando dotas de búsqueda Lucene, lo que permite a atacantes remotos realizar ataques de inyección de objetos PHP y ejecutar código arbitrario a través de vectores involucrando un objeto Zend_Pdf_ElementFactory_Proxy y un nombre de ruta con un caracter \0 final. • https://www.exploit-db.com/exploits/43886 http://openwall.com/lists/oss-security/2014/04/21/1 http://www.pimcore.org/en/resources/blog/pimcore+2.2+released_b442 https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt • CWE-94: Improper Control of Generation of Code ('Code Injection') •

CVSS: 6.4EPSS: 0%CPEs: 3EXPL: 2

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.1.0 does not properly handle an object obtained by unserializing a pathname, which allows remote attackers to conduct PHP object injection attacks and delete arbitrary files via vectors involving a Zend_Http_Response_Stream object. La función getObjectByToken en Newsletter.php en el módulo Pimcore_Tool_Newsletter en pimcore 1.4.9 hasta 2.1.0 no maneja debidamente un objeto obtenido deserializando un nombre de ruta, lo que permite a atacantes remotos realizar ataques de inyección de objetos PHP y eliminar archivos arbitrarios a través de vectores involucrando un objeto Zend_Http_Response_Stream. • https://www.exploit-db.com/exploits/43886 http://openwall.com/lists/oss-security/2014/04/21/1 http://www.pimcore.org/en/resources/blog/pimcore+2.2+released_b442 https://github.com/pedrib/PoC/blob/master/pimcore-2.1.0.txt • CWE-20: Improper Input Validation •