Description
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
No history.
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-04T13:00:52.107Z
Reserved: 2020-06-20T00:00:00.000Z
Link: CVE-2020-14933
No data.
Status : Modified
Published: 2020-06-20T13:15:10.523
Modified: 2024-11-21T05:04:28.083
Link: CVE-2020-14933
OpenCVE Enrichment
No data.