Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2019-5434

Опубликовано: 06 мая 2019
Источник: nvd
CVSS3: 9.8
CVSS2: 7.5
EPSS Критический

Описание

An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:revive-sas:revive_adserver:*:*:*:*:*:*:*:*
Версия до 4.2.0 (исключая)

EPSS

Процентиль: 100%
0.91979
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502

Связанные уязвимости

CVSS3: 9.8
github
больше 3 лет назад

An attacker could send a specifically crafted payload to the XML-RPC invocation script and trigger the unserialize() call on the "what" parameter in the "openads.spc" RPC method. Such vulnerability could be used to perform various types of attacks, e.g. exploit serialize-related PHP vulnerabilities or PHP object injection. It is possible, although unconfirmed, that the vulnerability has been used by some attackers in order to gain access to some Revive Adserver instances and deliver malware through them to third party websites. This vulnerability was addressed in version 4.2.0.

EPSS

Процентиль: 100%
0.91979
Критический

9.8 Critical

CVSS3

7.5 High

CVSS2

Дефекты

CWE-502
CWE-502