Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2023-28115

Опубликовано: 17 мар. 2023
Источник: ubuntu
Приоритет: medium
EPSS Средний
CVSS3: 9.8

Описание

Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the file_exists() function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the generateFromHtml() function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2.

РелизСтатусПримечание
bionic

ignored

end of standard support, was needs-triage
devel

DNE

esm-apps/bionic

needs-triage

esm-apps/focal

needs-triage

esm-apps/jammy

needs-triage

esm-apps/xenial

needs-triage

focal

ignored

end of standard support, was needs-triage
jammy

needs-triage

kinetic

ignored

end of life, was needs-triage
lunar

DNE

Показывать по

EPSS

Процентиль: 95%
0.16753
Средний

9.8 Critical

CVSS3

Связанные уязвимости

CVSS3: 9.8
nvd
почти 3 года назад

Snappy is a PHP library allowing thumbnail, snapshot or PDF generation from a url or a html page. Prior to version 1.4.2, Snappy is vulnerable to PHAR deserialization due to a lack of checking on the protocol before passing it into the `file_exists()` function. If an attacker can upload files of any type to the server he can pass in the phar:// protocol to unserialize the uploaded file and instantiate arbitrary PHP objects. This can lead to remote code execution especially when snappy is used with frameworks with documented POP chains like Laravel/Symfony vulnerable developer code. If a user can control the output file from the `generateFromHtml()` function, it will invoke deserialization. This vulnerability is capable of remote code execution if Snappy is used with frameworks or developer code with vulnerable POP chains. It has been fixed in version 1.4.2.

CVSS3: 9.8
debian
почти 3 года назад

Snappy is a PHP library allowing thumbnail, snapshot or PDF generation ...

CVSS3: 9.8
github
почти 3 года назад

PHAR deserialization allowing remote code execution

CVSS3: 9.8
fstec
почти 3 года назад

Уязвимость функции generateFromHtml() библиотеки PHP Snappy, позволяющая нарушителю выполнить произвольный код

EPSS

Процентиль: 95%
0.16753
Средний

9.8 Critical

CVSS3