CVE-2020-14933

NameCVE-2020-14933
Descriptioncompose.php in SquirrelMail 1.4.22 calls unserialize for the $attachments value, which originates from an HTTP POST request. NOTE: the vendor disputes this because these two conditions for PHP object injection are not satisfied: existence of a PHP magic method (such as __wakeup or __destruct), and any attack-relevant classes must be declared before unserialize is called (or must be autoloaded).
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesELA-268-1

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
squirrelmail (PTS)jessie, jessie (lts)2:1.4.23~svn20120406-2+deb8u5fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
squirrelmailsourcewheezy(unfixed)end-of-life
squirrelmailsourcejessie2:1.4.23~svn20120406-2+deb8u5ELA-268-1
squirrelmailsource(unstable)(unfixed)

Notes

https://www.openwall.com/lists/oss-security/2020/06/20/1

Search for package or bug name: Reporting problems