CVE-2017-7411
Severity CVSS v4.0:
Pending analysis
Type:
CWE-94
Code Injection
Publication date:
30/10/2017
Last modified:
20/04/2025
Description
An issue was discovered in Enalean Tuleap 9.6 and prior versions. The vulnerability exists because the User::getRecentElements() method is using the unserialize() function with a preference value that can be arbitrarily manipulated by malicious users through the REST API interface, and this can be exploited to inject arbitrary PHP objects into the application scope, allowing an attacker to perform a variety of attacks (including but not limited to Remote Code Execution).
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:a:enalean:tuleap:*:*:*:*:*:*:*:* | 9.6 (including) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://karmainsecurity.com/KIS-2017-02
- http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html
- http://seclists.org/fulldisclosure/2017/Oct/53
- http://www.openwall.com/lists/oss-security/2017/10/23/3
- https://tuleap.net/plugins/tracker/?aid=10118
- https://www.exploit-db.com/exploits/43374/
- http://karmainsecurity.com/KIS-2017-02
- http://packetstormsecurity.com/files/144716/Tuleap-9.6-Second-Order-PHP-Object-Injection.html
- http://seclists.org/fulldisclosure/2017/Oct/53
- http://www.openwall.com/lists/oss-security/2017/10/23/3
- https://tuleap.net/plugins/tracker/?aid=10118
- https://www.exploit-db.com/exploits/43374/