OpenCATS through 0.9.5-3 unsafely deserializes index.php?m=activity requests, leading to remote code execution. This occurs because lib/DataGrid.php calls unserialize for the parametersactivity:ActivityDataGrid parameter. The PHP object injection exploit chain can leverage an __destruct magic method in guzzlehttp.
References
Link | Resource |
---|---|
https://github.com/snoopysecurity/snoopysecurity.github.io/blob/master/web-application-security/2021/01/16/09_opencats_php_object_injection.html | Patch Third Party Advisory |
https://snoopysecurity.github.io/web-application-security/2021/01/16/09_opencats_php_object_injection.html | Exploit Third Party Advisory |
https://www.opencats.org/news/ | Vendor Advisory |
Configurations
History
No history.
Information
Published : 2021-01-18 06:15
Updated : 2024-02-04 21:23
NVD link : CVE-2021-25294
Mitre link : CVE-2021-25294
CVE.ORG link : CVE-2021-25294
JSON object : View
Products Affected
opencats
- opencats
CWE
CWE-502
Deserialization of Untrusted Data