CVE-2021-33898

In Invoice Ninja before 4.4.0, there is an unsafe call to unserialize() in app/Ninja/Repositories/AccountRepository.php that may allow an attacker to deserialize arbitrary PHP classes. In certain contexts, this can result in remote code execution. The attacker's input must be hosted at http://www.geoplugin.net (cleartext HTTP), and thus a successful attack requires spoofing that site or obtaining control of it.
References
Link Resource
https://github.com/invoiceninja/invoiceninja/issues/5909 Patch Third Party Advisory
Configurations

Configuration 1 (hide)

cpe:2.3:a:invoiceninja:invoice_ninja:*:*:*:*:*:*:*:*

History

15 Jun 2021, 18:33

Type Values Removed Values Added
CWE CWE-502
References (MISC) https://github.com/invoiceninja/invoiceninja/issues/5909 - (MISC) https://github.com/invoiceninja/invoiceninja/issues/5909 - Patch, Third Party Advisory
CVSS v2 : unknown
v3 : unknown
v2 : 6.8
v3 : 8.1
CPE cpe:2.3:a:invoiceninja:invoice_ninja:*:*:*:*:*:*:*:*

06 Jun 2021, 23:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-06-06 23:15

Updated : 2024-02-04 21:47


NVD link : CVE-2021-33898

Mitre link : CVE-2021-33898

CVE.ORG link : CVE-2021-33898


JSON object : View

Products Affected

invoiceninja

  • invoice_ninja
CWE
CWE-502

Deserialization of Untrusted Data