The unpack implementation in Swoole version 4.0.4 lacks correct size checks in the deserialization process. An attacker can craft a serialized object to exploit this vulnerability and cause a SEGV.
References
Link | Resource |
---|---|
https://github.com/swoole/swoole-src/issues/1882 | Issue Tracking Vendor Advisory |
https://github.com/swoole/swoole-src/commit/4cdbce5d9bf2fe596bb6acd7d6611f9e8c253a76 | Patch Vendor Advisory |
https://x-c3ll.github.io/posts/swoole-deserialization-cve-2018-15503/ | Technical Description Third Party Advisory |
Configurations
Information
Published : 2018-08-17 19:29
Updated : 2018-11-08 12:49
NVD link : CVE-2018-15503
Mitre link : CVE-2018-15503
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
swoole
- swoole