GHSA-52qp-jpq7-6c54

Suggest an improvement
Source
https://github.com/advisories/GHSA-52qp-jpq7-6c54
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2021/04/GHSA-52qp-jpq7-6c54/GHSA-52qp-jpq7-6c54.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-52qp-jpq7-6c54
Aliases
Published
2021-04-29T21:52:30Z
Modified
2024-02-17T05:35:17.607080Z
Severity
  • 9.8 (Critical) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Insecure Deserialization of untrusted data in rmccue/requests
Details

Impact

Unserialization of untrusted data.

Patches

The issue has been patched and users of Requests 1.6.0, 1.6.1 and 1.7.0 should update to version 1.8.0.

References

Publications about the vulnerability: * https://dannewitz.ninja/posts/php-unserialize-object-injection-yet-another-stars-rating-wordpress * https://github.com/ambionics/phpggc/issues/52 * https://blog.detectify.com/2019/07/23/improving-wordpress-plugin-security/ * https://i.blackhat.com/us-18/Thu-August-9/us-18-Thomas-Its-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-Know-It.pdf * https://cdn2.hubspot.net/hubfs/3853213/us-18-Thomas-It%27s-A-PHP-Unserialization-Vulnerability-Jim-But-Not-As-We-....pdf * https://2018.zeronights.ru/wp-content/uploads/materials/9%20ZN2018%20WV%20-%20PHP%20unserialize.pdf * https://medium.com/@knownsec404team/extend-the-attack-surface-of-php-deserialization-vulnerability-via-phar-d6455c6a1066#3c0f

Originally fixed in WordPress 5.5.2: * https://github.com/WordPress/wordpress-develop/commit/add6bedf3a53b647d0ebda2970057912d3cd79d3 * https://wordpress.org/news/2020/10/wordpress-5-5-2-security-and-maintenance-release/

Related Security Advisories: * https://cve.mitre.org/cgi-bin/cvename.cgi?name=2020-28032 * https://nvd.nist.gov/vuln/detail/CVE-2020-28032

Notification to the Requests repo including a fix in: * https://github.com/rmccue/Requests/pull/421 and * https://github.com/rmccue/Requests/pull/422

For more information

If you have any questions or comments about this advisory: * Open an issue in Request

Database specific
{
    "nvd_published_at": "2021-04-27T21:15:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "CRITICAL",
    "github_reviewed": true,
    "github_reviewed_at": "2021-04-27T20:54:56Z"
}
References

Affected packages

Packagist / rmccue/requests

Package

Name
rmccue/requests
Purl
pkg:composer/rmccue/requests

Affected ranges

Type
ECOSYSTEM
Events
Introduced
1.6.0
Fixed
1.8.0

Affected versions

v1.*

v1.6.0
v1.6.1
v1.7.0