{"id":"CVE-2019-14466","details":"The GOsa_Filter_Settings cookie in GONICUS GOsa 2.7.5.2 is vulnerable to PHP objection injection, which allows a remote authenticated attacker to perform file deletions (in the context of the user account that runs the web server) via a crafted cookie value, because unserialize is used to restore filter settings from a cookie.","modified":"2026-03-14T09:32:47.623263Z","published":"2019-12-31T18:15:11.233Z","references":[{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2019/08/msg00039.html"},{"type":"FIX","url":"https://github.com/gosa-project/gosa-core/pull/29"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/gosa-project/gosa-core","events":[{"introduced":"0"},{"last_affected":"9614926eebbe00b6aefbd55f9759fbb4829be514"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"2.7.5.2"}]}}],"versions":["2.7.5","2.7.5.1","2.7.5.2"],"database_specific":{"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2019-14466.json","unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"8.0"}]}]}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:H/A:N"}]}