CVE-2022-3568

See a problem?
Source
https://nvd.nist.gov/vuln/detail/CVE-2022-3568
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2022-3568.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2022-3568
Published
2023-02-10T00:15:10Z
Modified
2024-05-14T12:06:09.619590Z
Severity
  • 8.8 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H CVSS Calculator
Summary
[none]
Details

The ImageMagick Engine plugin for WordPress is vulnerable to deserialization of untrusted input via the 'cli_path' parameter in versions up to, and including 1.7.5. This makes it possible for unauthenticated users to call files using a PHAR wrapper, granted they can trick a site administrator into performing an action such as clicking on a link, that will deserialize and call arbitrary PHP Objects that can be used to perform a variety of malicious actions granted a POP chain is also present. It also requires that the attacker is successful in uploading a file with the serialized payload.

References

Affected packages

Git / github.com/orangelabweb/imagemagick-engine

Affected ranges

Type
GIT
Repo
https://github.com/orangelabweb/imagemagick-engine
Events
Introduced
0 Unknown introduced commit / All previous commits are affected
Fixed

Affected versions

1.*

1.6.0
1.6.1
1.6.2
1.6.3
1.6.4
1.7.4

v1.*

v1.5.5
v1.5.6