Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2021-36766

Опубликовано: 30 июл. 2021
Источник: nvd
CVSS3: 7.2
CVSS2: 6.5
EPSS Низкий

Описание

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

Ссылки

Уязвимые конфигурации

Конфигурация 1
cpe:2.3:a:concretecms:concrete_cms:*:*:*:*:*:*:*:*
Версия до 8.5.6 (исключая)

EPSS

Процентиль: 81%
0.01543
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502

Связанные уязвимости

github
больше 3 лет назад

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

CVSS3: 9.8
fstec
около 5 лет назад

Уязвимость реализации метода Logging::update_logging() CMS-системы Concrete5, позволяющая нарушителю выполнить произвольный PHP-код

EPSS

Процентиль: 81%
0.01543
Низкий

7.2 High

CVSS3

6.5 Medium

CVSS2

Дефекты

CWE-502