Learn about CVE-2019-14466, a PHP objection injection vulnerability in GONICUS GOsa 2.7.5.2 that allows remote file deletions. Find mitigation steps and preventive measures here.
In GONICUS GOsa 2.7.5.2, a vulnerability in the GOsa_Filter_Settings cookie allows an authenticated attacker to delete files remotely by manipulating the cookie value.
Understanding CVE-2019-14466
This CVE involves a PHP objection injection vulnerability that enables a remote attacker to delete files via a crafted cookie value.
What is CVE-2019-14466?
The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is susceptible to PHP objection injection, allowing a remote authenticated attacker to delete files within the user account running the web server.
The Impact of CVE-2019-14466
The vulnerability permits attackers to delete files remotely, compromising the integrity and confidentiality of the affected system.
Technical Details of CVE-2019-14466
The technical aspects of this CVE are as follows:
Vulnerability Description
The vulnerability arises from the misuse of the unserialize function to restore filter settings from a cookie, enabling the attacker to delete files.
Affected Systems and Versions
Exploitation Mechanism
The attack is executed by an authenticated attacker manipulating the GOsa_Filter_Settings cookie value to perform file deletions within the user account running the web server.
Mitigation and Prevention
To address CVE-2019-14466, consider the following steps:
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates