An issue was discovered in phpFox before 4.8.14. The url request parameter passed to the /core/redirect route is not properly sanitized before being used in a call to the unserialize() PHP function. This can be exploited by remote, unauthenticated attackers to inject arbitrary PHP objects into the application scope, allowing them to perform a variety of attacks, such as executing arbitrary PHP code.
References
Link | Resource |
---|---|
http://seclists.org/fulldisclosure/2023/Oct/30 | Exploit Mailing List Third Party Advisory |
https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 | Product |
https://karmainsecurity.com/KIS-2023-12 | Third Party Advisory |
https://karmainsecurity.com/pocs/CVE-2023-46817.php | Exploit Third Party Advisory |
https://www.phpfox.com/blog/ | Product |
http://seclists.org/fulldisclosure/2023/Oct/30 | Exploit Mailing List Third Party Advisory |
https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 | Product |
https://karmainsecurity.com/KIS-2023-12 | Third Party Advisory |
https://karmainsecurity.com/pocs/CVE-2023-46817.php | Exploit Third Party Advisory |
https://www.phpfox.com/blog/ | Product |
Configurations
History
21 Nov 2024, 08:29
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/fulldisclosure/2023/Oct/30 - Exploit, Mailing List, Third Party Advisory | |
References | () https://docs.phpfox.com/display/FOX4MAN/phpFox+4.8.14 - Product | |
References | () https://karmainsecurity.com/KIS-2023-12 - Third Party Advisory | |
References | () https://karmainsecurity.com/pocs/CVE-2023-46817.php - Exploit, Third Party Advisory | |
References | () https://www.phpfox.com/blog/ - Product |
06 Sep 2024, 14:35
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-03 05:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46817
Mitre link : CVE-2023-46817
CVE.ORG link : CVE-2023-46817
JSON object : View
Products Affected
phpfox
- phpfox
CWE
CWE-502
Deserialization of Untrusted Data