CVE-2020-4043

phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpmussel_project:phpmussel:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:32

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.7
References () https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4 - Patch, Release Notes, Third Party Advisory () https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4 - Patch, Release Notes, Third Party Advisory
References () https://github.com/phpMussel/phpMussel/issues/167 - Patch, Third Party Advisory () https://github.com/phpMussel/phpMussel/issues/167 - Patch, Third Party Advisory
References () https://github.com/phpMussel/phpMussel/pull/173 - Patch, Third Party Advisory () https://github.com/phpMussel/phpMussel/pull/173 - Patch, Third Party Advisory
References () https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh - Mitigation, Third Party Advisory () https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh - Mitigation, Third Party Advisory
References () https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities - Third Party Advisory () https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities - Third Party Advisory

Information

Published : 2020-06-10 20:15

Updated : 2024-11-21 05:32


NVD link : CVE-2020-4043

Mitre link : CVE-2020-4043

CVE.ORG link : CVE-2020-4043


JSON object : View

Products Affected

phpmussel_project

  • phpmussel
CWE
CWE-502

Deserialization of Untrusted Data