An issue was discovered in Squiz Matrix CMS 5.5.0 prior to 5.5.0.3, 5.5.1 prior to 5.5.1.8, 5.5.2 prior to 5.5.2.4, and 5.5.3 prior to 5.5.3.3 where a user can trigger arbitrary unserialization of a PHP object from a packages/cms/page_templates/page_remote_content/page_remote_content.inc POST parameter during processing of a Remote Content page type. This unserialization can be used to trigger the inclusion of arbitrary files on the filesystem (local file inclusion), and results in remote code execution.
References
Link | Resource |
---|---|
https://matrix.squiz.net/releases/5.5/5.5.3.3 | Release Notes |
https://zxsecurity.co.nz/wp-content/uploads/2019/12/ZX%20Security%20Advisory%20-%20Squiz%20Matrix%20CMS%20-%20Multiple%20Vulnerabilities.pdf | Exploit Third Party Advisory |
http://seclists.org/fulldisclosure/2019/Dec/34 | Exploit Mailing List Third Party Advisory |
http://packetstormsecurity.com/files/155671/Squiz-Matrix-CMS-5.5.x.x-Code-Execution-Information-Disclosure.html | Exploit Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2019-12-11 12:15
Updated : 2019-12-19 13:19
NVD link : CVE-2019-19373
Mitre link : CVE-2019-19373
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
squiz
- matrix