app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
References
Configurations
History
21 Nov 2024, 04:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://github.com/MISP/MISP/commit/c42c5fe92783dd306b7600db1f6a25324445b40c - Patch, Third Party Advisory | |
References | () https://zigrin.com/advisories/misp-command-injection-via-phar-deserialization/ - |
28 Sep 2023, 14:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
Information
Published : 2019-06-18 00:15
Updated : 2024-11-21 04:23
NVD link : CVE-2019-12868
Mitre link : CVE-2019-12868
CVE.ORG link : CVE-2019-12868
JSON object : View
Products Affected
misp
- misp
CWE
CWE-502
Deserialization of Untrusted Data