The "Remember me" feature in the opSecurityUser::getRememberLoginCookie function in lib/user/opSecurityUser.class.php in OpenPNE 3.6.13 before 3.6.13.1 and 3.8.9 before 3.8.9.1 does not properly validate login data in HTTP Cookie headers, which allows remote attackers to conduct PHP object injection attacks, and execute arbitrary PHP code, via a crafted serialized object.
References
Link | Resource |
---|---|
http://jvn.jp/en/jp/JVN69986880/index.html | |
http://jvndb.jvn.jp/jvndb/JVNDB-2014-000009 | |
http://secunia.com/advisories/54043 | Vendor Advisory |
http://secunia.com/secunia_research/2014-1/ | Vendor Advisory |
https://www.openpne.jp/archives/12293/ | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2014-01-24 15:08
Updated : 2024-02-04 18:35
NVD link : CVE-2013-5350
Mitre link : CVE-2013-5350
CVE.ORG link : CVE-2013-5350
JSON object : View
Products Affected
tejimaya
- openpne
CWE
CWE-20
Improper Input Validation