Gibbon through 26.0.00 allows remote authenticated users to conduct PHP deserialization attacks via columnOrder in a POST request to the modules/System%20Admin/import_run.php&type=externalAssessment&step=4 URI.
References
Link | Resource |
---|---|
https://gibbonedu.org/download/ | Product |
https://www.exploit-db.com/exploits/51903 | Exploit |
https://gibbonedu.org/download/ | Product |
https://www.exploit-db.com/exploits/51903 | Exploit |
Configurations
History
29 Jul 2025, 20:05
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:gibbonedu:gibbon:*:*:*:*:*:*:*:* | |
First Time |
Gibbonedu
Gibbonedu gibbon |
|
References | () https://gibbonedu.org/download/ - Product | |
References | () https://www.exploit-db.com/exploits/51903 - Exploit |
21 Nov 2024, 08:59
Type | Values Removed | Values Added |
---|---|---|
References | () https://gibbonedu.org/download/ - | |
References | () https://www.exploit-db.com/exploits/51903 - |
27 Aug 2024, 18:35
Type | Values Removed | Values Added |
---|---|---|
Summary |
|
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
CWE | CWE-502 |
23 Mar 2024, 23:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-23 23:15
Updated : 2025-07-29 20:05
NVD link : CVE-2024-24725
Mitre link : CVE-2024-24725
CVE.ORG link : CVE-2024-24725
JSON object : View
Products Affected
gibbonedu
- gibbon
CWE
CWE-502
Deserialization of Untrusted Data