VYPR
High severityNVD Advisory· Published Apr 21, 2014· Updated May 6, 2026

CVE-2014-2921

CVE-2014-2921

Description

The getObjectByToken function in Newsletter.php in the Pimcore_Tool_Newsletter module in pimcore 1.4.9 through 2.0.0 does not properly handle an object obtained by unserializing Lucene search data, which allows remote attackers to conduct PHP object injection attacks and execute arbitrary code via vectors involving a Zend_Pdf_ElementFactory_Proxy object and a pathname with a trailing \0 character.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
pimcore/pimcorePackagist
>= 1.4.9, < 2.2.02.2.0

Affected products

4
  • Pimcore/Pimcore4 versions
    cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:pimcore:pimcore:1.4.9:*:*:*:*:*:*:*
    • cpe:2.3:a:pimcore:pimcore:1.5.0:*:*:*:*:*:*:*
    • cpe:2.3:a:pimcore:pimcore:2.1.0:*:*:*:*:*:*:*
    • cpe:2.3:a:pimcore:pimcore:2.2.0:*:*:*:*:*:*:*

Patches

1
3cb2683e669b

security fix newsletter tool -> thanks to Pedro Ribeiro

https://github.com/pimcore/pimcorebruschMar 26, 2014via ghsa
1 file changed · +2 2
  • pimcore/lib/Pimcore/Tool/Newsletter.php+2 2 modified
    @@ -171,7 +171,7 @@ public function subscribe ($params) {
             }
    
     
    
             // generate token
    
    -        $token = base64_encode(serialize(array(
    
    +        $token = base64_encode(Zend_Json::encode(array(
    
                 "salt" => md5(microtime()),
    
                 "email" => $object->getEmail(),
    
                 "id" => $object->getId()
    
    @@ -218,7 +218,7 @@ public function sendConfirmationMail($object, $mailDocument, $params = array())
          * @return Object_Contrete
    
          */
    
         public function getObjectByToken($token) {
    
    -        $data = unserialize(base64_decode($token));
    
    +        $data = Zend_Json::decode(base64_decode($token));
    
             if($data) {
    
                 if($object = Object_Abstract::getById($data["id"])) {
    
     
    
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

7

News mentions

0

No linked articles in our index yet.