36 lines
1.2 KiB
JSON
Raw Normal View History

{
"id": "CVE-2023-46817",
"sourceIdentifier": "cve@mitre.org",
"published": "2023-11-03T05:15:30.867",
"lastModified": "2023-11-03T05:15:30.867",
"vulnStatus": "Received",
"descriptions": [
{
"lang": "en",
"value": "An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code."
}
],
"metrics": {},
"references": [
{
"url": "http://seclists.org/fulldisclosure/2023/Oct/30",
"source": "cve@mitre.org"
},
{
"url": "https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14",
"source": "cve@mitre.org"
},
{
"url": "https://karmainsecurity.com/KIS-2023-12",
"source": "cve@mitre.org"
},
{
"url": "https://karmainsecurity.com/pocs/CVE-2023-46817.php",
"source": "cve@mitre.org"
},
{
"url": "https://www.phpfox.com/blog/",
"source": "cve@mitre.org"
}
]
}