First published: Mon Apr 21 2014(Updated: )
The `getObjectByToken` function in `Newsletter.php` in the `Pimcore_Tool_Newsletter` module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a `Zend_Pdf_ElementFactory_Proxy` object and a pathname with a trailing `\0` character.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | >=1.4.9<2.2.0 | 2.2.0 |
Pimcore E-commerce Framework | =1.4.9 | |
Pimcore E-commerce Framework | =1.5.0 | |
Pimcore E-commerce Framework | =2.1.0 | |
Pimcore E-commerce Framework | =2.2.0 | |
=1.4.9 | ||
=1.5.0 | ||
=2.1.0 | ||
=2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-2921 has a high severity rating due to its potential for PHP object injection and remote code execution.
To mitigate CVE-2014-2921, upgrade your Pimcore installation to version 2.2.0 or later.
CVE-2014-2921 affects Pimcore versions 1.4.9 through 2.0.0.
CVE-2014-2921 can facilitate PHP object injection attacks that could lead to arbitrary code execution.
Using Pimcore versions prior to 2.2.0 poses a security risk due to the vulnerability identified in CVE-2014-2921.