CVE-2019-10867
Severity CVSS v4.0:
Pending analysis
Type:
CWE-502
Deserialization of Untrusted Dat
Publication date:
04/04/2019
Last modified:
18/03/2020
Description
An issue was discovered in Pimcore before 5.7.1. An attacker with classes permission can send a POST request to /admin/class/bulk-commit, which will make it possible to exploit the unserialize function when passing untrusted values in the data parameter to bundles/AdminBundle/Controller/Admin/DataObject/ClassController.php.
Impact
Base Score 3.x
8.80
Severity 3.x
HIGH
Base Score 2.0
6.50
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:pimcore:pimcore:*:*:*:*:*:*:*:* | 5.7.1 (excluding) |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://packetstormsecurity.com/files/152667/Pimcore-Unserialize-Remote-Code-Execution.html
- http://www.rapid7.com/db/modules/exploit/multi/http/pimcore_unserialize_rce
- https://blog.certimetergroup.com/it/articolo/security/polyglot_phar_deserialization_to_rce
- https://github.com/pimcore/pimcore/commit/38a29e2f4f5f060a73974626952501cee05fda73
- https://snyk.io/vuln/SNYK-PHP-PIMCOREPIMCORE-173998
- https://www.exploit-db.com/exploits/46783/



