cve/2024/CVE-2024-54135.md
2025-09-29 21:09:30 +02:00

19 lines
1.4 KiB
Markdown

### [CVE-2024-54135](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-54135)
![](https://img.shields.io/static/v1?label=Product&message=clipbucket-v5&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=%3E%3D%202.0%2C%20%3C%205.5.1%20Revision%20200%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Version&message=2.0%20&color=brightgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-502%3A%20Deserialization%20of%20Untrusted%20Data&color=brightgreen)
### Description
ClipBucket V5 provides open source video hosting with PHP. ClipBucket-v5 Version 2.0 to Version 5.5.1 Revision 199 are vulnerable to PHP Deserialization vulnerability. The vulnerability exists in upload/photo_upload.php within the decode_key function. User inputs were supplied to this function without sanitization via collection GET parameter and photoIDS POST parameter respectively. The decode_key function invokes PHP unserialize function as defined in upload/includes/classes/photos.class.php. As a result, it is possible for an adversary to inject maliciously crafted PHP serialized object and utilize gadget chains to cause unexpected behaviors of the application. This vulnerability is fixed in 5.5.1 Revision 200.
### POC
#### Reference
- https://github.com/MacWarrior/clipbucket-v5/security/advisories/GHSA-4523-mqmv-wrqx
#### Github
No PoCs found on GitHub currently.