CVE-2020-14933
20.06.2020, 13:15
compose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).Enginsight
Vendor | Product | Version |
---|---|---|
squirrelmail | squirrelmail | 1.4.22 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Common Weakness Enumeration