Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-r5q9-wmfc-68m2

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

EPSS

Процентиль: 83%
0.01856
Низкий

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 8.1
nvd
больше 4 лет назад

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

CVSS3: 8.1
fstec
больше 4 лет назад

Уязвимость вызова unserialize() программного средства Invoice Ninja, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 83%
0.01856
Низкий

Дефекты

CWE-502