GHSA-g77v-m226-3f7g

Suggest an improvement
Source
https://github.com/advisories/GHSA-g77v-m226-3f7g
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-g77v-m226-3f7g/GHSA-g77v-m226-3f7g.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-g77v-m226-3f7g
Aliases
Published
2022-05-13T01:18:46Z
Modified
2024-04-25T21:43:27.850826Z
Severity
  • 7.2 (High) CVSS_V3 - CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H CVSS Calculator
Summary
Froxlor PHP Object Injection vulnerability
Details

Froxlor version <= 0.9.39.5 contains a PHP Object Injection vulnerability in Domain name form that can result in Possible information disclosure and remote code execution. This attack appear to be exploitable via Passing malicious PHP objection in $POST['sslipandport']. This vulnerability appears to have been fixed in after commit c1e62e6.

Database specific
{
    "nvd_published_at": "2018-06-26T16:29:00Z",
    "cwe_ids": [
        "CWE-502"
    ],
    "severity": "HIGH",
    "github_reviewed": true,
    "github_reviewed_at": "2024-04-25T21:22:30Z"
}
References

Affected packages

Packagist / froxlor/froxlor

Package

Name
froxlor/froxlor
Purl
pkg:composer/froxlor/froxlor

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
0.9.40