openpsa contains a PHP Object Injection vulnerability in Form data passed as GET request variables that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Specially crafted GET request variable containing serialised PHP object. This vulnerability appears to have been fixed in after commit 097eae0.
References
Link | Resource |
---|---|
https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/ | Exploit Third Party Advisory |
https://github.com/flack/openpsa/issues/191 | Exploit Third Party Advisory |
https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/ | Exploit Third Party Advisory |
https://github.com/flack/openpsa/issues/191 | Exploit Third Party Advisory |
Configurations
History
21 Nov 2024, 03:40
Type | Values Removed | Values Added |
---|---|---|
References | () https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/ - Exploit, Third Party Advisory | |
References | () https://github.com/flack/openpsa/issues/191 - Exploit, Third Party Advisory |
Information
Published : 2018-06-26 16:29
Updated : 2024-11-21 03:40
NVD link : CVE-2018-1000525
Mitre link : CVE-2018-1000525
CVE.ORG link : CVE-2018-1000525
JSON object : View
Products Affected
openpsa2
- openpsa
CWE
CWE-502
Deserialization of Untrusted Data