Логотип exploitDog
bind:CVE-2021-33898
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2021-33898

Количество 3

Количество 3

nvd логотип

CVE-2021-33898

больше 4 лет назад

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

CVSS3: 8.1
EPSS: Низкий
github логотип

GHSA-r5q9-wmfc-68m2

больше 3 лет назад

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

EPSS: Низкий
fstec логотип

BDU:2021-03331

больше 4 лет назад

Уязвимость вызова unserialize() программного средства Invoice Ninja, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2021-33898

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

CVSS3: 8.1
2%
Низкий
больше 4 лет назад
github логотип
GHSA-r5q9-wmfc-68m2

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.

2%
Низкий
больше 3 лет назад
fstec логотип
BDU:2021-03331

Уязвимость вызова unserialize() программного средства Invoice Ninja, позволяющая нарушителю выполнить произвольный код

CVSS3: 8.1
2%
Низкий
больше 4 лет назад

Уязвимостей на страницу