CVE-2013-5350

The "Remember me" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:tejimaya:openpne:3.6.13:*:*:*:*:*:*:*
cpe:2.3:a:tejimaya:openpne:3.8.9:*:*:*:*:*:*:*

History

21 Nov 2024, 01:57

Type Values Removed Values Added
References () http://jvn.jp/en/jp/JVN69986880/index.html - () http://jvn.jp/en/jp/JVN69986880/index.html -
References () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009 - () http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009 -
References () http://secunia.com/advisories/54043 - Vendor Advisory () http://secunia.com/advisories/54043 - Vendor Advisory
References () http://secunia.com/secunia_research/2014-1/ - Vendor Advisory () http://secunia.com/secunia_research/2014-1/ - Vendor Advisory
References () https://www.openpne.jp/archives/12293/ - Vendor Advisory () https://www.openpne.jp/archives/12293/ - Vendor Advisory

Information

Published : 2014-01-24 15:08

Updated : 2024-11-21 01:57


NVD link : CVE-2013-5350

Mitre link : CVE-2013-5350

CVE.ORG link : CVE-2013-5350


JSON object : View

Products Affected

tejimaya

  • openpne
CWE
CWE-20

Improper Input Validation