Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-wvm3-h9rx-qj3q

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.

OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.

EPSS

Процентиль: 96%
0.27726
Средний

Дефекты

CWE-502

Связанные уязвимости

CVSS3: 9.8
nvd
около 5 лет назад

OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.

EPSS

Процентиль: 96%
0.27726
Средний

Дефекты

CWE-502