Описание
MelisCms provides a full CMS for Melis Platform, including templating system, drag'n'drop of plugins, SEO and many administration tools. Attackers can deserialize arbitrary data on affected versions of melisplatform/melis-cms, and ultimately leads to the execution of arbitrary PHP code on the system. Conducting this attack does not require authentication. Users should immediately upgrade to melisplatform/melis-cms >= 5.0.1. This issue was addressed by restricting allowed classes when deserializing user-controlled data.
Ссылки
- PatchThird Party Advisory
- Third Party Advisory
- PatchThird Party Advisory
- Third Party Advisory
Уязвимые конфигурации
Конфигурация 1Версия до 5.0.1 (исключая)
cpe:2.3:a:melistechnology:meliscms:*:*:*:*:*:*:*:*
EPSS
Процентиль: 75%
0.00888
Низкий
7.7 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-502
CWE-502
Связанные уязвимости
CVSS3: 7.7
github
больше 3 лет назад
melisplatform/melis-cms vulnerable to deserialization of untrusted data
EPSS
Процентиль: 75%
0.00888
Низкий
7.7 High
CVSS3
9.8 Critical
CVSS3
Дефекты
CWE-502
CWE-502