Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-492p-w2m4-4h4m

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

EPSS

Процентиль: 81%
0.01543
Низкий

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 7.2
nvd
больше 4 лет назад

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

CVSS3: 9.8
fstec
около 5 лет назад

Уязвимость реализации метода Logging::update_logging() CMS-системы Concrete5, позволяющая нарушителю выполнить произвольный PHP-код

EPSS

Процентиль: 81%
0.01543
Низкий

Дефекты

CWE-502