CVE-2023-46817

An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code.
Configurations

Configuration 1 (hide)

cpe:2.3:a:phpfox:phpfox:*:*:*:*:*:*:*:*

History

21 Nov 2024, 08:29

Type Values Removed Values Added
References () http://seclists.org/fulldisclosure/2023/Oct/30 - Exploit, Mailing List, Third Party Advisory () http://seclists.org/fulldisclosure/2023/Oct/30 - Exploit, Mailing List, Third Party Advisory
References () https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 - Product () https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 - Product
References () https://karmainsecurity.com/KIS-2023-12 - Third Party Advisory () https://karmainsecurity.com/KIS-2023-12 - Third Party Advisory
References () https://karmainsecurity.com/pocs/CVE-2023-46817.php - Exploit, Third Party Advisory () https://karmainsecurity.com/pocs/CVE-2023-46817.php - Exploit, Third Party Advisory
References () https://www.phpfox.com/blog/ - Product () https://www.phpfox.com/blog/ - Product

06 Sep 2024, 14:35

Type Values Removed Values Added
New CVE

Information

Published : 2023-11-03 05:15

Updated : 2024-11-21 08:29


NVD link : CVE-2023-46817

Mitre link : CVE-2023-46817

CVE.ORG link : CVE-2023-46817


JSON object : View

Products Affected

phpfox

  • phpfox
CWE
CWE-502

Deserialization of Untrusted Data