First published: Mon Dec 16 2019(Updated: )
The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Drupal Views Dynamic Field | <=6.x-1.4 | |
Drupal Views Dynamic Field | =7.x-1.0-alpha1 | |
Drupal Views Dynamic Field | =7.x-1.0-alpha2 | |
Drupal Views Dynamic Field | =7.x-1.0-alpha3 | |
Drupal Views Dynamic Field | =7.x-1.0-alpha4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.