First published: Mon Apr 21 2014(Updated: )
The `getObjectByToken` function in `Newsletter.php` in the `Pimcore_Tool_Newsletter` module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a `Zend_Pdf_ElementFactory_Proxy` object and a pathname with a trailing `\0` character.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
composer/pimcore/pimcore | >=1.4.9<2.2.0 | 2.2.0 |
Pimcore Pimcore | =1.4.9 | |
Pimcore Pimcore | =1.5.0 | |
Pimcore Pimcore | =2.1.0 | |
Pimcore Pimcore | =2.2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.