An issue was discovered in TCPDF before 6.2.22. Attackers can trigger deserialization of arbitrary data via the phar:// wrapper.
References
Link | Resource |
---|---|
https://github.com/tecnickcom/TCPDF/commit/1861e33fe05f653b67d070f7c106463e7a5c26ed | Patch Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Mar/36 | Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/152200/TCPDF-6.2.19-Deserialization-Remote-Code-Execution.html | Third Party Advisory VDB Entry |
https://github.com/LimeSurvey/LimeSurvey/commit/1cdd78d27697b3150bb44aaa7af1a81062a591a5 | Patch Third Party Advisory |
https://www.exploit-db.com/exploits/46634/ | VDB Entry Third Party Advisory |
http://packetstormsecurity.com/files/152360/LimeSurvey-Deserialization-Remote-Code-Execution.html | Exploit Third Party Advisory VDB Entry |
https://contao.org/en/news/security-vulnerability-cve-2018-17057.html | Third Party Advisory |
Information
Published : 2018-09-14 13:29
Updated : 2019-04-26 09:38
NVD link : CVE-2018-17057
Mitre link : CVE-2018-17057
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
limesurvey
- limesurvey
tecnick
- tcpdf