compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
Metrics
Affected Vendors & Products
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:00:52.107Z
Reserved: 2020-06-20T00:00:00
Link: CVE-2020-14933
No data.
Status : Modified
Published: 2020-06-20T13:15:10.523
Modified: 2024-11-21T05:04:28.083
Link: CVE-2020-14933
OpenCVE Enrichment
No data.