Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-3pxc-92w9-cmx7

Опубликовано: 07 сент. 2022
Источник: github
Github: Не прошло ревью
CVSS3: 7.2

Описание

The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

EPSS

Процентиль: 80%
0.01401
Низкий

7.2 High

CVSS3

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 7.2
nvd
больше 3 лет назад

The Broken Link Checker plugin for WordPress is vulnerable to deserialization of untrusted input via the '$log_file' value in versions up to, and including 1.11.16. This makes it possible for authenticated attackers with administrative privileges and above to call files using a PHAR wrapper that will deserialize the data and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

EPSS

Процентиль: 80%
0.01401
Низкий

7.2 High

CVSS3

Дефекты

CWE-502