### [CVE-2024-54135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54135) ![](https://img.shields.io/static/v1?label=Product&message=clipbucket-v5&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.0%2C%20%3C%205.5.1%20Revision%20200%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=2.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brightgreen) ### Description ClipBucket V5 provides open source video hosting with PHP. ClipBucket-v5 Version 2.0 to Version 5.5.1 Revision 199 are vulnerable to PHP Deserialization vulnerability. The vulnerability exists in upload/photo_upload.php within the decode_key function. User inputs were supplied to this function without sanitization via collection GET parameter and photoIDS POST parameter respectively. The decode_key function invokes PHP unserialize function as defined in upload/includes/classes/photos.class.php. As a result, it is possible for an adversary to inject maliciously crafted PHP serialized object and utilize gadget chains to cause unexpected behaviors of the application. This vulnerability is fixed in 5.5.1 Revision 200. ### POC #### Reference - https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-4523-mqmv-wrqx #### Github No PoCs found on GitHub currently.