Логотип exploitDog
bind:CVE-2021-36766
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-36766

Количество 3

Количество 3

nvd логотип

CVE-2021-36766

больше 4 лет назад

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

CVSS3: 7.2
EPSS: Низкий
github логотип

GHSA-492p-w2m4-4h4m

больше 3 лет назад

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

EPSS: Низкий
fstec логотип

BDU:2021-03930

около 5 лет назад

Уязвимость реализации метода Logging::update_logging() CMS-системы Concrete5, позволяющая нарушителю выполнить произвольный PHP-код

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-36766

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

CVSS3: 7.2
2%
Низкий
больше 4 лет назад
github логотип
GHSA-492p-w2m4-4h4m

Concrete5 through 8.5.5 deserializes Untrusted Data. The vulnerable code is located within the controllers/single_page/dashboard/system/environment/logging.php Logging::update_logging() method. User input passed through the logFile request parameter is not properly sanitized before being used in a call to the file_exists() PHP function. This can be exploited by malicious users to inject arbitrary PHP objects into the application scope (PHP Object Injection via phar:// stream wrapper), allowing them to carry out a variety of attacks, such as executing arbitrary PHP code.

2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03930

Уязвимость реализации метода Logging::update_logging() CMS-системы Concrete5, позволяющая нарушителю выполнить произвольный PHP-код

CVSS3: 9.8
2%
Низкий
около 5 лет назад

Уязвимостей на страницу