A PHP object injection bug in profile.php in qcubed (all versions including 3.1.1) unserializes the untrusted data of the POST-variable “strProfileData” and allows an unauthenticated attacker to execute code via a crafted POST request.
qcubed.com
seclists.org/fulldisclosure/2021/Mar/28
github.com/qcubed/qcubed
github.com/qcubed/qcubed/pull/1320/files
nvd.nist.gov/vuln/detail/CVE-2020-24914
tech.feedyourhead.at/content/QCubed-PHP-Object-Injection-CVE-2020-24914
www.ait.ac.at/themen/cyber-security/pentesting/security-advisories/ait-sa-20210215-01