phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0.
References
Configurations
History
21 Nov 2024, 05:32
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.7 |
References | () https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4 - Patch, Release Notes, Third Party Advisory | |
References | () https://github.com/phpMussel/phpMussel/issues/167 - Patch, Third Party Advisory | |
References | () https://github.com/phpMussel/phpMussel/pull/173 - Patch, Third Party Advisory | |
References | () https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh - Mitigation, Third Party Advisory | |
References | () https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities - Third Party Advisory |
Information
Published : 2020-06-10 20:15
Updated : 2024-11-21 05:32
NVD link : CVE-2020-4043
Mitre link : CVE-2020-4043
CVE.ORG link : CVE-2020-4043
JSON object : View
Products Affected
phpmussel_project
- phpmussel
CWE
CWE-502
Deserialization of Untrusted Data