Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-xcx8-qfq7-xq62

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.

The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.

EPSS

Процентиль: 81%
0.01547
Низкий

Связанные уязвимости

CVSS3: 9.8
nvd
около 6 лет назад

The Views Dynamic Fields module through 7.x-1.0-alpha4 for Drupal makes insecure unserialize calls in handlers/views_handler_filter_dynamic_fields.inc, as demonstrated by PHP object injection, involving a field_names object and an Archive_Tar object, for file deletion. Code execution might also be possible.

CVSS3: 9.8
fstec
около 6 лет назад

Уязвимость компонента handlers/views_handler_filter_dynamic_fields.inc модуля Views Dynamic Fields CMS-системы Drupal, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 81%
0.01547
Низкий