The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.
References
Link | Resource |
---|---|
https://www.drupal.org/project/views_dynamic_fields/issues/3056600 | Vendor Advisory |
https://www.drupal.org/project/views_dynamic_fields/issues/3056600 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 04:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.drupal.org/project/views_dynamic_fields/issues/3056600 - Vendor Advisory |
Information
Published : 2019-12-16 23:15
Updated : 2024-11-21 04:35
NVD link : CVE-2019-19826
Mitre link : CVE-2019-19826
CVE.ORG link : CVE-2019-19826
JSON object : View
Products Affected
drupal
- views_dynamic_field
CWE
CWE-502
Deserialization of Untrusted Data