app/Model/Server.php in MISP 2.4.109 allows remote command execution by a super administrator because the PHP file_exists function is used with user-controlled entries, and phar:// URLs trigger deserialization.
References
Link | Resource |
---|---|
https://github.com/MISP/MISP/commit/c42c5fe92783dd306b7600db1f6a25324445b40c | Patch Third Party Advisory |
Configurations
Information
Published : 2019-06-17 17:15
Updated : 2019-06-18 13:12
NVD link : CVE-2019-12868
Mitre link : CVE-2019-12868
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
misp
- misp