mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
103 lines
3.8 KiB
JSON
103 lines
3.8 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security-advisories@github.com",
|
|
"ID": "CVE-2020-4043",
|
|
"STATE": "PUBLIC",
|
|
"TITLE": "Phar unserialization vulnerability in phpMussel"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "phpMussel",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": ">= 1.0.0, < 1.6.0"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "phpMussel"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "phpMussel from versions 1.0.0 and less than 1.6.0 has an unserialization vulnerability in PHP's phar wrapper. Uploading a specially crafted file to an affected version allows arbitrary code execution (discovered, tested, and confirmed by myself), so the risk factor should be regarded as very high. Newer phpMussel versions don't use PHP's phar wrapper, and are therefore unaffected. This has been fixed in version 1.6.0."
|
|
}
|
|
]
|
|
},
|
|
"impact": {
|
|
"cvss": {
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 7.7,
|
|
"baseSeverity": "HIGH",
|
|
"confidentialityImpact": "NONE",
|
|
"integrityImpact": "HIGH",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "CHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:N/I:H/A:N",
|
|
"version": "3.1"
|
|
}
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "CWE-502: Deserialization of Untrusted Data"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://github.com/phpMussel/phpMussel/security/advisories/GHSA-qr95-4mq5-r3fh"
|
|
},
|
|
{
|
|
"name": "https://github.com/phpMussel/phpMussel/issues/167",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/phpMussel/phpMussel/issues/167"
|
|
},
|
|
{
|
|
"name": "https://github.com/phpMussel/phpMussel/pull/173",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/phpMussel/phpMussel/pull/173"
|
|
},
|
|
{
|
|
"name": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/phpMussel/phpMussel/commit/97f25973433921c1f953430f32d3081adc4851a4"
|
|
},
|
|
{
|
|
"name": "https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities",
|
|
"refsource": "MISC",
|
|
"url": "https://github.com/phpMussel/phpMussel/security/policy#currently-known-vulnerabilities"
|
|
}
|
|
]
|
|
},
|
|
"source": {
|
|
"advisory": "GHSA-qr95-4mq5-r3fh",
|
|
"discovery": "UNKNOWN"
|
|
}
|
|
} |