First published: Sat Jun 20 2020(Updated: )
compose.php in SquirrelMail 1.4.22 calls unserialize for the $mailtodata value, which originates from an HTTP GET request. This is related to mailto.php.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
SquirrelMail | =1.4.22 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14932 is classified as a moderate severity vulnerability due to the potential for remote code execution through unserialization.
To fix CVE-2020-14932, upgrade to the latest version of SquirrelMail or apply a patch that mitigates the unserialization of untrusted data.
CVE-2020-14932 specifically affects SquirrelMail version 1.4.22.
The impact of CVE-2020-14932 on SquirrelMail users includes the risk of remote code execution, which can lead to unauthorized access and data compromise.
CVE-2020-14932 is related to mailto.php, as it involves the handling of mailto data within the application.