phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0.
References
Link | Resource |
---|---|
https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh | Mitigation Third Party Advisory |
https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities | Third Party Advisory |
https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4 | Patch Release Notes Third Party Advisory |
https://github.com/phpMussel/phpMussel/issues/167 | Patch Third Party Advisory |
https://github.com/phpMussel/phpMussel/pull/173 | Patch Third Party Advisory |
Configurations
Information
Published : 2020-06-10 13:15
Updated : 2020-06-22 10:07
NVD link : CVE-2020-4043
Mitre link : CVE-2020-4043
JSON object : View
CWE
CWE-502
Deserialization of Untrusted Data
Products Affected
phpmussel_project
- phpmussel