Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2mh8-69x2-q9m6

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE

The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE

EPSS

Процентиль: 89%
0.04455
Низкий

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
больше 4 лет назад

The joomsport_md_load AJAX action of the JoomSport WordPress plugin before 5.1.8, registered for both unauthenticated and unauthenticated users, unserialised user input from the shattr POST parameter, leading to a PHP Object Injection issue. Even though the plugin does not have a suitable gadget chain to exploit this, other installed plugins could, which might lead to more severe issues such as RCE

EPSS

Процентиль: 89%
0.04455
Низкий

Дефекты

CWE-502