Логотип exploitDog
bind:CVE-2024-40624
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2024-40624

Количество 2

Количество 2

nvd логотип

CVE-2024-40624

больше 1 года назад

TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies. One can use phpggc and the chain Guzzle/FW1 to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie bb_t will be deserialized when browsing to viewforum.php. This issue has been addressed in commit `ed37e6e52` which is expected to be included in release version 2.4.4. Users are advised to upgrade as soon as the new release is available. There are no known workarounds for this vulnerability.

CVSS3: 9.8
EPSS: Низкий
github логотип

GHSA-fg86-4c2r-7wxw

больше 1 года назад

TorrentPier Deserialization of Untrusted Data vulnerability

CVSS3: 9.8
EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
nvd логотип
CVE-2024-40624

TorrentPier is an open source BitTorrent Public/Private tracker engine, written in php. In `torrentpier/library/includes/functions.php`, `get_tracks()` uses the unsafe native PHP serialization format to deserialize user-controlled cookies. One can use phpggc and the chain Guzzle/FW1 to write PHP code to an arbitrary file, and execute commands on the system. For instance, the cookie bb_t will be deserialized when browsing to viewforum.php. This issue has been addressed in commit `ed37e6e52` which is expected to be included in release version 2.4.4. Users are advised to upgrade as soon as the new release is available. There are no known workarounds for this vulnerability.

CVSS3: 9.8
0%
Низкий
больше 1 года назад
github логотип
GHSA-fg86-4c2r-7wxw

TorrentPier Deserialization of Untrusted Data vulnerability

CVSS3: 9.8
0%
Низкий
больше 1 года назад

Уязвимостей на страницу