Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Unsafe Deserialization via unserialize #515

Closed
snoopysecurity opened this issue Jan 18, 2021 · 0 comments · Fixed by #534
Closed

Unsafe Deserialization via unserialize #515

snoopysecurity opened this issue Jan 18, 2021 · 0 comments · Fixed by #534

Comments

@snoopysecurity
Copy link

Expected behavior and actual behavior.

OpenCATs is vulnerable to PHP Object injection due to taking userinput via the unserialize function. A user could leverage this to execute code on an attacker's system

Steps to reproduce the problem.

You can see steps on how this vulnerability could be exploited here: https://snoopysecurity.github.io/web-application-security/2021/01/16/09_opencats_php_object_injection.html

What version of opencats are you running?

Latest: https://github.com/opencats/OpenCATS/tree/develop/docker

Release or downloaded from Git?

Latest

WAMP or LAMP?

LAMP - Used docker container within https://github.com/opencats/OpenCATS/tree/develop/docker

What version of PHP and MySQL are you running

PHP7

attach appropriate error logs. Please attach [apache/mysql] error/access logs as needed.

@RussH RussH linked a pull request May 11, 2021 that will close this issue
@RussH RussH closed this as completed in #534 Nov 9, 2021
Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
None yet
Projects
None yet
Development

Successfully merging a pull request may close this issue.

1 participant