The "Remember me" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object.
References
Link | Resource |
---|---|
https://www.openpne.jp/archives/12293/ | Vendor Advisory |
http://secunia.com/secunia_research/2014-1/ | Vendor Advisory |
http://jvn.jp/en/jp/JVN69986880/index.html | |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009 | |
http://secunia.com/advisories/54043 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2014-01-24 07:08
Updated : 2014-01-24 14:00
NVD link : CVE-2013-5350
Mitre link : CVE-2013-5350
JSON object : View
CWE
CWE-20
Improper Input Validation
Products Affected
tejimaya
- openpne