openpsa contains a PHP Object Injection vulnerability in Form data passed as GET request variables that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Specially crafted GET request variable containing serialised PHP object. This vulnerability appears to have been fixed in after commit 097eae0.
References
Link | Resource |
---|---|
https://github.com/flack/openpsa/issues/191 | Exploit Third Party Advisory |
https://0dd.zone/2018/05/31/OpenPSA-Object-Injection/ | Exploit Third Party Advisory |
Configurations
Information
Published : 2018-06-26 09:29
Updated : 2020-08-24 10:37
NVD link : CVE-2018-1000525
Mitre link : CVE-2018-1000525
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
openpsa2
- openpsa